{"title":"协作通信中虚假数据注入的检测与缓解","authors":"S. Kim","doi":"10.1109/SPAWC.2015.7227052","DOIUrl":null,"url":null,"abstract":"We propose a likelihood ratio based physical-layer technique for detecting and mitigating the false data injection attack in cooperative communication systems. We present the optimum detection method that minimizes the end-to-end outage probability and the minmax detection method that minimizes the maximum possible outage probability under unknown attack probability. We show that the optimum detection technique can provide almost the same end-to-end outage probability that can be provided by the ideal cryptographic technique that perfectly detects the false injection at the expense of high computational cost and bandwidth overhead. The proposed solution can be used as an additional layer of protection or can complement to the conventional cryptographic techniques.","PeriodicalId":211324,"journal":{"name":"2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection and mitigation of false data injection in cooperative communications\",\"authors\":\"S. Kim\",\"doi\":\"10.1109/SPAWC.2015.7227052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a likelihood ratio based physical-layer technique for detecting and mitigating the false data injection attack in cooperative communication systems. We present the optimum detection method that minimizes the end-to-end outage probability and the minmax detection method that minimizes the maximum possible outage probability under unknown attack probability. We show that the optimum detection technique can provide almost the same end-to-end outage probability that can be provided by the ideal cryptographic technique that perfectly detects the false injection at the expense of high computational cost and bandwidth overhead. The proposed solution can be used as an additional layer of protection or can complement to the conventional cryptographic techniques.\",\"PeriodicalId\":211324,\"journal\":{\"name\":\"2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPAWC.2015.7227052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPAWC.2015.7227052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection and mitigation of false data injection in cooperative communications
We propose a likelihood ratio based physical-layer technique for detecting and mitigating the false data injection attack in cooperative communication systems. We present the optimum detection method that minimizes the end-to-end outage probability and the minmax detection method that minimizes the maximum possible outage probability under unknown attack probability. We show that the optimum detection technique can provide almost the same end-to-end outage probability that can be provided by the ideal cryptographic technique that perfectly detects the false injection at the expense of high computational cost and bandwidth overhead. The proposed solution can be used as an additional layer of protection or can complement to the conventional cryptographic techniques.