Physical Detection of Misbehavior in Relay Systems With Unreliable Channel State Information

We study the detection of misbehavior in a Gaussian relay system, where the source transmits information to the destination with the assistance of an amplify-and-forward relay node subject to unreliable channel state information (CSI). The relay node may be potentially malicious and corrupt the network by forwarding garbled information. In this situation, misleading feedback may take place, since reliable CSI is unavailable at the source and/or the destination. By classifying the action of the relay as detectable or undetectable, we propose a novel approach that is capable of coping with any malicious attack detected and continuing to work effectively in the presence of unreliable CSI. We demonstrate that the detectable class of attacks can be successfully detected with a high probability. Meanwhile, the undetectable class of attacks does not affect the performance improvements that are achievable by cooperative diversity, even though such an attack may fool the proposed detection approach. We also extend the method to deal with the case in which there is no direct link between the source and the destination. The effectiveness of the proposed approach has been validated by numerical results.

[1]  Tiejun Lv,et al.  Detecting substitution attacks against non-colluding relays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[2]  Sang Wu Kim Physical Integrity Check in Cooperative Relay Communications , 2015, IEEE Transactions on Wireless Communications.

[3]  Helmut Bölcskei,et al.  Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.

[4]  Wan-Jen Huang,et al.  Misbehavior Detection Without Channel Information in Cooperative Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[5]  Min Wu,et al.  Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.

[6]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[7]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[8]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[9]  H.T. Sencar,et al.  Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[11]  Wei-Ho Chung,et al.  Noncoherent Detection of Misbehaving Relays in Decode-and-Forward Cooperative Networks , 2015, IEEE Communications Letters.

[12]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[13]  Wan-Jen Huang,et al.  Noncoherent misbehavior detection in space-time coded cooperative networks , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Gregory W. Wornell,et al.  Energy-efficient antenna sharing and relaying for wireless networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[15]  M. Haardt,et al.  Analysis of Multihop Relaying Networks: Communication Between Range-Limited and Cooperative Nodes , 2012, IEEE Vehicular Technology Magazine.

[16]  Eric Graves,et al.  Detection of channel degradation attack by Intermediary Node in Linear Networks , 2012, 2012 Proceedings IEEE INFOCOM.

[17]  Gerhard Fettweis,et al.  Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.

[18]  Xianbin Wang,et al.  Misbehavior detection in amplify-and-forward cooperative OFDM systems , 2013, 2013 IEEE International Conference on Communications (ICC).

[19]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[20]  P. Takis Mathiopoulos,et al.  Performance Analysis of Dual-Hop AF Relaying Systems over Mixed $\eta{-}\mu$ and $\kappa{-} \mu$ Fading Channels , 2013, IEEE Transactions on Vehicular Technology.

[21]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[22]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[23]  Jitendra K. Tugnait,et al.  Self-Contamination for Detection of Pilot Contamination Attack in Multiple Antenna Systems , 2015, IEEE Wireless Communications Letters.

[24]  Panagiotis Papadimitratos,et al.  Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[25]  Ruohan Cao,et al.  Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays , 2016, IEEE Access.