liu.seSearch for publications in DiVA
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Detecting Active Attacks in Over-the-Air Computation using Dummy Samples
Linköping University, Department of Electrical Engineering, Communication Systems. Linköping University, Faculty of Science & Engineering.
Linköping University, Department of Electrical Engineering, Communication Systems. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0001-5621-2860
Linköping University, Department of Electrical Engineering, Communication Systems. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0002-7599-4367
2023 (English)In: FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, IEEE , 2023, p. 1691-1696Conference paper, Published paper (Refereed)
Abstract [en]

Over-the-Air (OtA) computation is a newly emerged concept for computing functions of data from distributed nodes by taking advantage of the wave superposition property of wireless channels. Despite its advantage in communication efficiency, OtA computation is associated with significant security and privacy concerns that have so far not been thoroughly investigated, especially in the case of active attacks. In this paper, we propose and evaluate a detection scheme against active attacks in OtA computation systems. More explicitly, we consider an active attacker which is an external node sending random or misleading data to alter the aggregated data received by the server. To detect the presence of the attacker, in every communication period, legitimate users send some dummy samples in addition to the real data. We propose a detector design that relies on the existence of a shared secret only known by the legitimate users and the server, that can be used to hide the transmitted signal in a secret subspace. After the server projects the received vector back to the original subspace, the dummy samples can be used to detect active attacks. We show that this design achieves good detection performance for a small cost in terms of channel resources.

Place, publisher, year, edition, pages
IEEE , 2023. p. 1691-1696
Series
Conference Record of the Asilomar Conference on Signals Systems and Computers, ISSN 1058-6393, E-ISSN 2576-2303
Keywords [en]
Over-the-Air computation; Anomaly Detection; Byzantine Fault Tolerance
National Category
Signal Processing
Identifiers
URN: urn:nbn:se:liu:diva-208697DOI: 10.1109/IEEECONF59524.2023.10476745ISI: 001207755100308ISBN: 9798350325744 (electronic)ISBN: 9798350325751 (print)OAI: oai:DiVA.org:liu-208697DiVA, id: diva2:1907442
Conference
57th Asilomar Conference on Signals, Systems and Computers, ELECTR NETWORK, oct 29-nov 01, 2023
Note

Funding Agencies|ELLIIT; Swedish Research Council (VR); Swedish Foundation for Strategic Research [(SSF)-SURPRISE]

Available from: 2024-10-22 Created: 2024-10-22 Last updated: 2024-10-22

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Search in DiVA

By author/editor
Nordlund, DavidChen, ZhengLarsson, Erik G
By organisation
Communication SystemsFaculty of Science & Engineering
Signal Processing

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 73 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf