liu.seSök publikationer i DiVA
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Detecting Active Attacks in Over-the-Air Computation using Dummy Samples
Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem. Linköpings universitet, Tekniska fakulteten.
Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem. Linköpings universitet, Tekniska fakulteten.ORCID-id: 0000-0001-5621-2860
Linköpings universitet, Institutionen för systemteknik, Kommunikationssystem. Linköpings universitet, Tekniska fakulteten.ORCID-id: 0000-0002-7599-4367
2023 (Engelska)Ingår i: FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, IEEE , 2023, s. 1691-1696Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Over-the-Air (OtA) computation is a newly emerged concept for computing functions of data from distributed nodes by taking advantage of the wave superposition property of wireless channels. Despite its advantage in communication efficiency, OtA computation is associated with significant security and privacy concerns that have so far not been thoroughly investigated, especially in the case of active attacks. In this paper, we propose and evaluate a detection scheme against active attacks in OtA computation systems. More explicitly, we consider an active attacker which is an external node sending random or misleading data to alter the aggregated data received by the server. To detect the presence of the attacker, in every communication period, legitimate users send some dummy samples in addition to the real data. We propose a detector design that relies on the existence of a shared secret only known by the legitimate users and the server, that can be used to hide the transmitted signal in a secret subspace. After the server projects the received vector back to the original subspace, the dummy samples can be used to detect active attacks. We show that this design achieves good detection performance for a small cost in terms of channel resources.

Ort, förlag, år, upplaga, sidor
IEEE , 2023. s. 1691-1696
Serie
Conference Record of the Asilomar Conference on Signals Systems and Computers, ISSN 1058-6393, E-ISSN 2576-2303
Nyckelord [en]
Over-the-Air computation; Anomaly Detection; Byzantine Fault Tolerance
Nationell ämneskategori
Signalbehandling
Identifikatorer
URN: urn:nbn:se:liu:diva-208697DOI: 10.1109/IEEECONF59524.2023.10476745ISI: 001207755100308ISBN: 9798350325744 (digital)ISBN: 9798350325751 (tryckt)OAI: oai:DiVA.org:liu-208697DiVA, id: diva2:1907442
Konferens
57th Asilomar Conference on Signals, Systems and Computers, ELECTR NETWORK, oct 29-nov 01, 2023
Anmärkning

Funding Agencies|ELLIIT; Swedish Research Council (VR); Swedish Foundation for Strategic Research [(SSF)-SURPRISE]

Tillgänglig från: 2024-10-22 Skapad: 2024-10-22 Senast uppdaterad: 2024-10-22

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltext

Sök vidare i DiVA

Av författaren/redaktören
Nordlund, DavidChen, ZhengLarsson, Erik G
Av organisationen
KommunikationssystemTekniska fakulteten
Signalbehandling

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 73 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf