Detecting arbitrary attacks using continuous secured side information in wireless networks

R Cao - IEEE Access, 2017 - ieeexplore.ieee.org
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay
network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding …

Detecting Byzantine Attacks for Gaussian Two-Way Relay System

R Cao - arXiv preprint arXiv:1612.01707, 2016 - arxiv.org
This paper focuses on Byzantine attack detection for Gaussian two-way relay network. In this
network, two source nodes communicate with each other with the help of an amplify-and …

Detecting Byzantine attacks without clean reference

R Cao, TF Wong, T Lv, H Gao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider an amplify-and-forward relay network composed of a source, two relays, and a
destination. In this network, the two relays are untrusted in the sense that they may perform …

On Study of physical-layer attack detection for large volumes of data

R Cao, Y Lu - 2017 IEEE Second International Conference on …, 2017 - ieeexplore.ieee.org
We consider Byzantine attack detection for Gaussian two-way relay network which carries
large volumes of data. Two source nodes communicate with each other with the help of an …

Strong secrecy and reliable Byzantine detection in the presence of an untrusted relay

X He, A Yener - IEEE transactions on information theory, 2012 - ieeexplore.ieee.org
We consider a Gaussian two-hop network where the source and the destination can
communicate only via a relay node who is both an eavesdropper and a Byzantine …

[引用][C] A physical-layer attack detection method using continuous secured side information

R Cao - arXiv preprint arXiv:1701.01590, 2017

Secrecy and reliable Byzantine detection in a Gaussian untrusted two-hop link

H Xiang, A Yener - 2010 IEEE Information Theory Workshop on …, 2010 - ieeexplore.ieee.org
We consider a Gaussian two-hop link where the source and the destination can
communicate only via a relay node who is both an eavesdropper and a Byzantine attacker …

Detectability of symbol manipulation by an amplify-and-forward relay

E Graves, T Wong - arXiv preprint arXiv:1205.2681, 2012 - arxiv.org
This paper studies the problem of detecting a potential malicious relay node by a source
node that relies on the relay to forward information to other nodes. The channel model of two …

Physical-layer secret key generation with untrusted relays

CDT Thai, J Lee, C Cheng… - 2014 IEEE Globecom …, 2014 - ieeexplore.ieee.org
In this paper, we propose a physical-layer secret key generation scheme for multi-antenna
legitimate nodes with the help from multiple untrusted relays with single antenna. The relays' …

Detection of channel degradation attack by intermediary node in linear networks

E Graves, TF Wong - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
We consider the problem of two sources wanting to share information through a potentially
untrustworthy intermediary node. We assume that the two sources transmit random symbols …