Physical detection of misbehavior in relay systems with unreliable channel state information

T Lv, Y Yin, Y Lu, S Yang, E Liu… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
We study the detection of misbehavior in a Gaussian relay system, where the source
transmits information to the destination with the assistance of an amplify-and-forward relay …

Noncoherent detection of misbehaving relays in decode-and-forward cooperative networks

LC Lo, WJ Huang, RY Chang… - IEEE Communications …, 2015 - ieeexplore.ieee.org
This letter considers a three-node cooperative network with an untrusted relay. We propose
a noncoherent relay misbehavior detection scheme for decode-and-forward (DF) systems …

Detecting Byzantine attacks without clean reference

R Cao, TF Wong, T Lv, H Gao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider an amplify-and-forward relay network composed of a source, two relays, and a
destination. In this network, the two relays are untrusted in the sense that they may perform …

Detecting arbitrary attacks using continuous secured side information in wireless networks

R Cao - IEEE Access, 2017 - ieeexplore.ieee.org
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay
network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding …

Attack detection for massive MIMO relay system

R Cao, Y Wan, H Yu, Y Lu, H Gao - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
This article focuses on a two-hop relay system, where a potential malicious single-antenna
relay may forward altered symbols to a base station (BS) equipped with massive antennas …

Detecting and tracing iid attacks in networks with any number of relays

R Cao, S Huang, Y Lu - IEEE Access, 2016 - ieeexplore.ieee.org
This paper investigates the detection and tracing problems in a multi-relay network, where a
source wants to exchange the information with a destination through multiple potential …

On Study of physical-layer attack detection for large volumes of data

R Cao, Y Lu - 2017 IEEE Second International Conference on …, 2017 - ieeexplore.ieee.org
We consider Byzantine attack detection for Gaussian two-way relay network which carries
large volumes of data. Two source nodes communicate with each other with the help of an …

Detecting Byzantine Attacks for Gaussian Two-Way Relay System

R Cao - arXiv preprint arXiv:1612.01707, 2016 - arxiv.org
This paper focuses on Byzantine attack detection for Gaussian two-way relay network. In this
network, two source nodes communicate with each other with the help of an amplify-and …

Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against iid Attacks

X Zheng, R Cao, H Gao, Y Lu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
This paper considers channel coding problems with the requirement of guaranteeing
information integrity in the presence of malicious relays (MRs). The proved random channel …

On blind sequential detection of misbehaving relay

YM Yi, LC Lo, WJ Huang - … of The 2012 Asia Pacific Signal and …, 2012 - ieeexplore.ieee.org
Consider a three-node cooperative system where the relay may misbehave for selfish or
adversarial reasons. We propose a blind sequential detection to determine relay's …