On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries

07/06/2023
by   Soumita Hazra, et al.
0

In wireless security, cognitive adversaries are known to inject jamming energy on the victim's frequency band and monitor the same band for countermeasures thereby trapping the victim. Under the class of cognitive adversaries, we propose a new threat model wherein the adversary, upon executing the jamming attack, measures the long-term statistic of Kullback-Leibler Divergence (KLD) between its observations over each of the network frequencies before and after the jamming attack. To mitigate this adversary, we propose a new cooperative strategy wherein the victim takes the assistance for a helper node in the network to reliably communicate its message to the destination. The underlying idea is to appropriately split their energy and time resources such that their messages are reliably communicated without disturbing the statistical distribution of the samples in the network. We present rigorous analyses on the reliability and the covertness metrics at the destination and the adversary, respectively, and then synthesize tractable algorithms to obtain near-optimal division of resources between the victim and the helper. Finally, we show that the obtained near-optimal division of energy facilitates in deceiving the adversary with a KLD estimator.

READ FULL TEXT
research
02/07/2023

Low-Latency Communication using Delay-Aware Relays Against Reactive Adversaries

This work addresses a reactive jamming attack on the low-latency message...
research
04/19/2020

Fast-Forward Relaying Scheme to Mitigate Jamming Attacks by Full-Duplex Radios

In this work, we address reliable communication of low-latency packets i...
research
04/28/2021

Non-Coherent Fast-Forward Relays for Full-Duplex Jamming Attack

This work addresses a strategy to mitigate jamming attack on low-latency...
research
04/11/2023

A Topology by Geometrization for Sub-Iterated Immediate Snapshot Message Adversaries and Applications to Set-Agreement

The Iterated Immediate Snapshot model (IIS) is a central model in the me...
research
01/12/2020

Competitive Broadcast against Adaptive Adversary in Multi-channel Radio Networks

Wireless networks are vulnerable to adversarial jamming due to the open ...
research
05/26/2022

Constellation Design for Non-Coherent Fast-Forward Relays to Mitigate Full-Duplex Jamming Attacks

With potential applications to short-packet communication, we address co...
research
02/07/2022

Channel Capacity for Adversaries with Computationally Bounded Observations

We study reliable communication over point-to-point adversarial channels...

Please sign up or login with your details

Forgot password? Click here to reset