Achievable Rates of Attack Detection Strategies in Echo-Assisted Communication

01/21/2019
by   Mohit Goyal, et al.
0

We consider an echo-assisted communication model wherein block-coded messages transmitted by a source reach the destination as multiple noisy copies. We address adversarial attacks on such models wherein a subset of the received copies at the destination are rendered unreliable by an adversary. Particularly, we study a non-persistent attack model with the adversary attacking 50 destination to detect the attacked copies within every codeword before combining them to recover the information bits. Our main objective is to compute the achievable rates of practical attack-detection strategies as a function of their false-positive and miss-detection rates. However, due to intractability in obtaining closed-form expressions on mutual information, we present a new framework to approximate the achievable rates in terms of their false-positives under special conditions. We show that the approximate rates offered by our framework is lower bounded by that of conservative countermeasures, thereby giving rise to interesting questions on code-design criteria at the source. Finally, we showcase the approximate rates achieved by traditional as well as neural-network based attack-detection strategies, and study their applicability to detect attacks on block-coded messages of short block-lengths.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/19/2022

Dissemination Control in Dynamic Data Clustering For Dense IIoT Against False Data Injection Attack

The IoT has made possible the development of increasingly driven service...
research
12/02/2020

Simple Closed-Form Approximations for Achievable Information Rates of Coded Modulation Systems

The intuitive sphere-packing argument is used to obtain analytically-tra...
research
08/07/2023

Unsupervised Adversarial Detection without Extra Model: Training Loss Should Change

Adversarial robustness poses a critical challenge in the deployment of d...
research
07/24/2020

Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

Advanced persistent threats (APTs) are organized prolonged cyberattacks ...
research
02/07/2023

Low-Latency Communication using Delay-Aware Relays Against Reactive Adversaries

This work addresses a reactive jamming attack on the low-latency message...
research
02/28/2020

Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks

Cryptocurrency off-chain networks such as Lightning (e.g., Bitcoin) or R...

Please sign up or login with your details

Forgot password? Click here to reset