Detectability of symbol manipulation by an amplify-and-forward relay

E Graves, T Wong - arXiv preprint arXiv:1205.2681, 2012 - arxiv.org
This paper studies the problem of detecting a potential malicious relay node by a source
node that relies on the relay to forward information to other nodes. The channel model of two …

Detecting substitution attacks against non-colluding relays

R Cao, E Graves, TF Wong, T Lv - 2013 IEEE Global …, 2013 - ieeexplore.ieee.org
The goal of this paper is to obtain the channel conditions (if exist) under which substitution
attacks performed by relay node (s) in a relay network can be detected. The network model …

Detection of channel degradation attack by intermediary node in linear networks

E Graves, TF Wong - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
We consider the problem of two sources wanting to share information through a potentially
untrustworthy intermediary node. We assume that the two sources transmit random symbols …

Physical detection of misbehavior in relay systems with unreliable channel state information

T Lv, Y Yin, Y Lu, S Yang, E Liu… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
We study the detection of misbehavior in a Gaussian relay system, where the source
transmits information to the destination with the assistance of an amplify-and-forward relay …

Detecting Byzantine attacks without clean reference

R Cao, TF Wong, T Lv, H Gao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider an amplify-and-forward relay network composed of a source, two relays, and a
destination. In this network, the two relays are untrusted in the sense that they may perform …

On cooperative and malicious behaviors in multirelay fading channels

MH Chen, SC Lin, YWP Hong… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Multirelay networks exploit spatial diversity by transmitting user's messages through multiple
relay paths. Most works in the literature on cooperative or relay networks assume that all …

Error probability in multi-source, multi-relay networks under falsified data injection attacks

TA Khalaf, SW Kim - MILCOM 2008-2008 IEEE Military …, 2008 - ieeexplore.ieee.org
We analyze the probability of decoding error in a multi-source, multi-relay wireless network,
in which the adversary may inject falsified data through captured relay nodes. To detect …

On the jamming power allocation and signal design in DF relay networks

X Zhou, M Qiu, SC Lin… - 2013 Asilomar Conference …, 2013 - ieeexplore.ieee.org
This paper studies a simple decode-and-forward (DF) relay network in the presence of a
jammer. The jammer is able to send noise-like signals to interfere with the signal reception …

On blind sequential detection of misbehaving relay

YM Yi, LC Lo, WJ Huang - … of The 2012 Asia Pacific Signal and …, 2012 - ieeexplore.ieee.org
Consider a three-node cooperative system where the relay may misbehave for selfish or
adversarial reasons. We propose a blind sequential detection to determine relay's …

MAP detection of misbehaving relay in wireless multiple access relay networks

SW Kim, T Khalaf, S Kim - IEEE communications letters, 2011 - ieeexplore.ieee.org
We propose the maximum a posteriori (MAP) detection of the misbehaving relay that injects
false data or adds channel errors into the network encoder in multiple access relay …