当前位置: X-MOL 学术IEEE Trans. Signal Process. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge
IEEE Transactions on Signal Processing ( IF 4.6 ) Pub Date : 2020-01-01 , DOI: 10.1109/tsp.2020.2993165
Holger Boche , Rafael F. Schaefer , H. Vincent Poor

Wireless communication systems are inherently vulnerable to intentional jamming. In this paper, two classes of such jammers are considered: those with partial and full knowledge. While the first class accounts for those jammers that know the encoding and decoding function, the latter accounts for those that are further aware of the actual transmitted message. Of particular interest are so-called denial-of-service (DoS) attacks in which the jammer is able to completely disrupt any transmission. Accordingly, it is of crucial interest for the legitimate users to detect such adversarial DoS attacks. This paper develops a detection framework based on Turing machines. Turing machines have no limitations on computational complexity and computing capacity and storage and can simulate any given algorithm. For both scenarios of a jammer with partial and full knowledge, it is shown that there exists no Turing machine which can decide whether or not a DoS attack is possible for a given channel and the corresponding decision problem is undecidable. On the other hand, it is shown for both scenarios that it is possible to algorithmically characterize those channels for which a DoS attack is not possible. This means that it is possible to detect those scenarios in which the jammer is not able to disrupt the communication. For all other channels, the Turing machine does not stop and runs forever making this decision problem semidecidable. Finally, it is shown that additional coordination resources such as common randomness make the communication robust against such attacks.

中文翻译:

对通信系统的拒绝服务攻击:可检测性和干扰器知识

无线通信系统本质上容易受到故意干扰的影响。在本文中,考虑了两类这样的干扰器:具有部分知识和全部知识的干扰器。第一类是那些知道编码和解码功能的干扰器,后者是那些进一步了解实际传输消息的干扰器。特别令人感兴趣的是所谓的拒绝服务 (DoS) 攻击,在这种攻击中,干扰器能够完全中断任何传输。因此,合法用户检测此类对抗性 DoS 攻击至关重要。本文开发了一个基于图灵机的检测框架。图灵机对计算复杂度、计算能力和存储没有限制,可以模拟任何给定的算法。对于具有部分知识和全部知识的干扰机的两种情况,表明不存在可以决定给定信道是否可能进行 DoS 攻击的图灵机,并且相应的决策问题是不可判定的。另一方面,这两种情况都表明,可以通过算法来表征那些不可能进行 DoS 攻击的信道。这意味着可以检测干扰器无法中断通信的情况。对于所有其他通道,图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。结果表明,不存在图灵机可以决定对给定通道是否可能进行 DoS 攻击,相应的决策问题是不可判定的。另一方面,这两种情况都表明,可以通过算法来表征那些不可能进行 DoS 攻击的信道。这意味着可以检测干扰器无法中断通信的情况。对于所有其他通道,图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。结果表明,不存在图灵机可以决定对给定通道是否可能进行 DoS 攻击,相应的决策问题是不可判定的。另一方面,这两种情况都表明,可以通过算法来表征那些不可能进行 DoS 攻击的信道。这意味着可以检测干扰器无法中断通信的情况。对于所有其他通道,图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。这两种情况都表明,可以通过算法来表征那些不可能进行 DoS 攻击的信道。这意味着可以检测干扰器无法中断通信的情况。对于所有其他通道,图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。这两种情况都表明,可以通过算法来表征那些不可能进行 DoS 攻击的信道。这意味着可以检测干扰器无法中断通信的情况。对于所有其他通道,图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。图灵机不会停止并永远运行,使这个决策问题变得半可判定。最后,结果表明,额外的协调资源(如公共随机性)使通信对此类攻击具有鲁棒性。
更新日期:2020-01-01
down
wechat
bug