{"title":"使用假样本检测空中计算中的主动攻击","authors":"David Nordlund, Zheng Chen, Erik G. Larsson","doi":"arxiv-2312.08950","DOIUrl":null,"url":null,"abstract":"Over-the-Air (OtA) computation is a newly emerged concept for computing\nfunctions of data from distributed nodes by taking advantage of the wave\nsuperposition property of wireless channels. Despite its advantage in\ncommunication efficiency, OtA computation is associated with significant\nsecurity and privacy concerns that have so far not been thoroughly\ninvestigated, especially in the case of active attacks. In this paper, we\npropose and evaluate a detection scheme against active attacks in OtA\ncomputation systems. More explicitly, we consider an active attacker which is\nan external node sending random or misleading data to alter the aggregated data\nreceived by the server. To detect the presence of the attacker, in every\ncommunication period, legitimate users send some dummy samples in addition to\nthe real data. We propose a detector design that relies on the existence of a\nshared secret only known by the legitimate users and the server, that can be\nused to hide the transmitted signal in a secret subspace. After the server\nprojects the received vector back to the original subspace, the dummy samples\ncan be used to detect active attacks. We show that this design achieves good\ndetection performance for a small cost in terms of channel resources.","PeriodicalId":501433,"journal":{"name":"arXiv - CS - Information Theory","volume":"25 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detecting Active Attacks in Over-the-Air Computation using Dummy Samples\",\"authors\":\"David Nordlund, Zheng Chen, Erik G. Larsson\",\"doi\":\"arxiv-2312.08950\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over-the-Air (OtA) computation is a newly emerged concept for computing\\nfunctions of data from distributed nodes by taking advantage of the wave\\nsuperposition property of wireless channels. Despite its advantage in\\ncommunication efficiency, OtA computation is associated with significant\\nsecurity and privacy concerns that have so far not been thoroughly\\ninvestigated, especially in the case of active attacks. In this paper, we\\npropose and evaluate a detection scheme against active attacks in OtA\\ncomputation systems. More explicitly, we consider an active attacker which is\\nan external node sending random or misleading data to alter the aggregated data\\nreceived by the server. To detect the presence of the attacker, in every\\ncommunication period, legitimate users send some dummy samples in addition to\\nthe real data. We propose a detector design that relies on the existence of a\\nshared secret only known by the legitimate users and the server, that can be\\nused to hide the transmitted signal in a secret subspace. After the server\\nprojects the received vector back to the original subspace, the dummy samples\\ncan be used to detect active attacks. We show that this design achieves good\\ndetection performance for a small cost in terms of channel resources.\",\"PeriodicalId\":501433,\"journal\":{\"name\":\"arXiv - CS - Information Theory\",\"volume\":\"25 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Information Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2312.08950\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Information Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2312.08950","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
空中计算(OtA)是一个新出现的概念,它利用无线信道的波叠加特性,计算分布式节点的数据函数。尽管空中计算在通信效率方面具有优势,但它在安全和隐私方面却存在重大隐患,迄今为止尚未对其进行深入研究,尤其是在主动攻击的情况下。在本文中,我们提出并评估了一种针对 OtA 计算系统中主动攻击的检测方案。更明确地说,我们认为主动攻击者是一个外部节点,它发送随机或误导数据来改变服务器接收到的聚合数据。为了检测攻击者的存在,在每次通信期间,合法用户都会在真实数据之外发送一些虚假样本。我们提出了一种检测器设计,它依赖于只有合法用户和服务器知道的共享秘密的存在,该秘密可用于将传输信号隐藏在秘密子空间中。服务器将接收到的矢量投影回原始子空间后,假样本就可以用来检测主动攻击。我们的研究表明,这种设计以较小的信道资源成本实现了良好的检测性能。
Detecting Active Attacks in Over-the-Air Computation using Dummy Samples
Over-the-Air (OtA) computation is a newly emerged concept for computing
functions of data from distributed nodes by taking advantage of the wave
superposition property of wireless channels. Despite its advantage in
communication efficiency, OtA computation is associated with significant
security and privacy concerns that have so far not been thoroughly
investigated, especially in the case of active attacks. In this paper, we
propose and evaluate a detection scheme against active attacks in OtA
computation systems. More explicitly, we consider an active attacker which is
an external node sending random or misleading data to alter the aggregated data
received by the server. To detect the presence of the attacker, in every
communication period, legitimate users send some dummy samples in addition to
the real data. We propose a detector design that relies on the existence of a
shared secret only known by the legitimate users and the server, that can be
used to hide the transmitted signal in a secret subspace. After the server
projects the received vector back to the original subspace, the dummy samples
can be used to detect active attacks. We show that this design achieves good
detection performance for a small cost in terms of channel resources.