Detecting malicious behavior in cooperative diversity

Sintayehu Dehnie, Huserv T. Senear, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechanism to ensure relay's adherence to the cooperation strategy, the receiver is often assumed to be passive. In this paper, we consider a smart destination which examines relay's signal prior to applying diversity combining. This is attributed to the assumption that relay may not conform to the cooperation strategies at all times and may behave maliciously. Based on this assumption, we develop a statistical detection technique to mitigate malicious relay behavior in decode-and-forward cooperation strategy. The detection technique statistically compares the signals received from the two diversity branches to determine the relay's behavior. As the uncertainty in the direct path is only due to the channel, correlation of received signals from the source and relay provides a basis to characterize relay behavior. We show, both by analysis and simulation, that a malicious relay reduces the correlation between the received signals in the diversity branch. Finally, we investigate bit-error rate and outage behavior performance in the presence of a smart destination.

Original languageEnglish (US)
Title of host publicationForty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
Pages895-899
Number of pages5
DOIs
StatePublished - 2007
Event41st Annual Conference on Information Sciences and Systems, CISS 2007 - Baltimore, MD, United States
Duration: Mar 14 2007Mar 16 2007

Other

Other41st Annual Conference on Information Sciences and Systems, CISS 2007
CountryUnited States
CityBaltimore, MD
Period3/14/073/16/07

Fingerprint

Outages
Bit error rate
Communication
Uncertainty

Keywords

  • Communication system security
  • Diversity techniques
  • Fading channels
  • Relay channel

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Dehnie, S., Senear, H. T., & Memon, N. (2007). Detecting malicious behavior in cooperative diversity. In Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings (pp. 895-899). [4298437] https://doi.org/10.1109/CISS.2007.4298437

Detecting malicious behavior in cooperative diversity. / Dehnie, Sintayehu; Senear, Huserv T.; Memon, Nasir.

Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings. 2007. p. 895-899 4298437.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dehnie, S, Senear, HT & Memon, N 2007, Detecting malicious behavior in cooperative diversity. in Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings., 4298437, pp. 895-899, 41st Annual Conference on Information Sciences and Systems, CISS 2007, Baltimore, MD, United States, 3/14/07. https://doi.org/10.1109/CISS.2007.4298437
Dehnie S, Senear HT, Memon N. Detecting malicious behavior in cooperative diversity. In Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings. 2007. p. 895-899. 4298437 https://doi.org/10.1109/CISS.2007.4298437
Dehnie, Sintayehu ; Senear, Huserv T. ; Memon, Nasir. / Detecting malicious behavior in cooperative diversity. Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings. 2007. pp. 895-899
@inproceedings{836fdf1e6f22429799b79d56f8d10b35,
title = "Detecting malicious behavior in cooperative diversity",
abstract = "We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechanism to ensure relay's adherence to the cooperation strategy, the receiver is often assumed to be passive. In this paper, we consider a smart destination which examines relay's signal prior to applying diversity combining. This is attributed to the assumption that relay may not conform to the cooperation strategies at all times and may behave maliciously. Based on this assumption, we develop a statistical detection technique to mitigate malicious relay behavior in decode-and-forward cooperation strategy. The detection technique statistically compares the signals received from the two diversity branches to determine the relay's behavior. As the uncertainty in the direct path is only due to the channel, correlation of received signals from the source and relay provides a basis to characterize relay behavior. We show, both by analysis and simulation, that a malicious relay reduces the correlation between the received signals in the diversity branch. Finally, we investigate bit-error rate and outage behavior performance in the presence of a smart destination.",
keywords = "Communication system security, Diversity techniques, Fading channels, Relay channel",
author = "Sintayehu Dehnie and Senear, {Huserv T.} and Nasir Memon",
year = "2007",
doi = "10.1109/CISS.2007.4298437",
language = "English (US)",
isbn = "1424410371",
pages = "895--899",
booktitle = "Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings",

}

TY - GEN

T1 - Detecting malicious behavior in cooperative diversity

AU - Dehnie, Sintayehu

AU - Senear, Huserv T.

AU - Memon, Nasir

PY - 2007

Y1 - 2007

N2 - We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechanism to ensure relay's adherence to the cooperation strategy, the receiver is often assumed to be passive. In this paper, we consider a smart destination which examines relay's signal prior to applying diversity combining. This is attributed to the assumption that relay may not conform to the cooperation strategies at all times and may behave maliciously. Based on this assumption, we develop a statistical detection technique to mitigate malicious relay behavior in decode-and-forward cooperation strategy. The detection technique statistically compares the signals received from the two diversity branches to determine the relay's behavior. As the uncertainty in the direct path is only due to the channel, correlation of received signals from the source and relay provides a basis to characterize relay behavior. We show, both by analysis and simulation, that a malicious relay reduces the correlation between the received signals in the diversity branch. Finally, we investigate bit-error rate and outage behavior performance in the presence of a smart destination.

AB - We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechanism to ensure relay's adherence to the cooperation strategy, the receiver is often assumed to be passive. In this paper, we consider a smart destination which examines relay's signal prior to applying diversity combining. This is attributed to the assumption that relay may not conform to the cooperation strategies at all times and may behave maliciously. Based on this assumption, we develop a statistical detection technique to mitigate malicious relay behavior in decode-and-forward cooperation strategy. The detection technique statistically compares the signals received from the two diversity branches to determine the relay's behavior. As the uncertainty in the direct path is only due to the channel, correlation of received signals from the source and relay provides a basis to characterize relay behavior. We show, both by analysis and simulation, that a malicious relay reduces the correlation between the received signals in the diversity branch. Finally, we investigate bit-error rate and outage behavior performance in the presence of a smart destination.

KW - Communication system security

KW - Diversity techniques

KW - Fading channels

KW - Relay channel

UR - http://www.scopus.com/inward/record.url?scp=44049108259&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=44049108259&partnerID=8YFLogxK

U2 - 10.1109/CISS.2007.4298437

DO - 10.1109/CISS.2007.4298437

M3 - Conference contribution

AN - SCOPUS:44049108259

SN - 1424410371

SN - 9781424410378

SP - 895

EP - 899

BT - Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings

ER -