TY - JOUR
T1 - Denial-of-service attacks on communication systems
T2 - Detectability and jammer knowledge
AU - Boche, Holger
AU - Schaefer, Rafael F.
AU - Poor, H. Vincent
N1 - Funding Information:
Manuscript received June 6, 2019; revised November 28, 2019; accepted April 22, 2020. Date of publication April 8, 2020; date of current version June 26, 2020. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Z. Quan. This work of H. Boche was supported in part by the German Federal Ministry of Education and Research (BMBF) within the national initiative for “Post Shannon Communication (NewCom)” under Grant 16KIS1003K and in part by the German Research Foundation (DFG) within the Gottfried Wilhelm Leibniz Prize under Grant BO 1734/20-1 and within Germany’s Excellence Strategy EXC-2111—390814868. This work of Rafael F. Schaefer was supported in part by the BMBF within NewCom under Grant 16KIS1004 and in part by the DFG under Grant SCHA 1944/6-1. This work of H. Vincent Poor was supported by the U.S. National Science Foundation under Grants CCF-0939370, CCF-1513915, and CCF-1908308. This article was presented in part at the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, May 2019 [1]. (Corresponding author: Rafael Schaefer.) Holger Boche is with the Institute of Theoretical Information Technology, Technische Universität München, 80290 Munich, Germany, and also with the Munich Center for Quantum Science and Technology (MCQST), 80799 Munich, Germany (e-mail: boche@tum.de).
Publisher Copyright:
© 1991-2012 IEEE.
PY - 2020
Y1 - 2020
N2 - Wireless communication systems are inherently vulnerable to intentional jamming. In this paper, two classes of such jammers are considered: Those with partial and full knowledge. While the first class accounts for those jammers that know the encoding and decoding function, the latter accounts for those that are further aware of the actual transmitted message. Of particular interest are so-called denial-of-service (DoS) attacks in which the jammer is able to completely disrupt any transmission. Accordingly, it is of crucial interest for the legitimate users to detect such adversarial DoS attacks. This paper develops a detection framework based on Turing machines. Turing machines have no limitations on computational complexity and computing capacity and storage and can simulate any given algorithm. For both scenarios of a jammer with partial and full knowledge, it is shown that there exists no Turing machine which can decide whether or not a DoS attack is possible for a given channel and the corresponding decision problem is undecidable. On the other hand, it is shown for both scenarios that it is possible to algorithmically characterize those channels for which a DoS attack is not possible. This means that it is possible to detect those scenarios in which the jammer is not able to disrupt the communication. For all other channels, the Turing machine does not stop and runs forever making this decision problem semidecidable. Finally, it is shown that additional coordination resources such as common randomness make the communication robust against such attacks.
AB - Wireless communication systems are inherently vulnerable to intentional jamming. In this paper, two classes of such jammers are considered: Those with partial and full knowledge. While the first class accounts for those jammers that know the encoding and decoding function, the latter accounts for those that are further aware of the actual transmitted message. Of particular interest are so-called denial-of-service (DoS) attacks in which the jammer is able to completely disrupt any transmission. Accordingly, it is of crucial interest for the legitimate users to detect such adversarial DoS attacks. This paper develops a detection framework based on Turing machines. Turing machines have no limitations on computational complexity and computing capacity and storage and can simulate any given algorithm. For both scenarios of a jammer with partial and full knowledge, it is shown that there exists no Turing machine which can decide whether or not a DoS attack is possible for a given channel and the corresponding decision problem is undecidable. On the other hand, it is shown for both scenarios that it is possible to algorithmically characterize those channels for which a DoS attack is not possible. This means that it is possible to detect those scenarios in which the jammer is not able to disrupt the communication. For all other channels, the Turing machine does not stop and runs forever making this decision problem semidecidable. Finally, it is shown that additional coordination resources such as common randomness make the communication robust against such attacks.
KW - Wireless communication
KW - adversarial attacks
KW - algorithmic computability
KW - detectability of denial-of-service (DoS) attacks
UR - http://www.scopus.com/inward/record.url?scp=85089517715&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85089517715&partnerID=8YFLogxK
U2 - 10.1109/TSP.2020.2993165
DO - 10.1109/TSP.2020.2993165
M3 - Article
AN - SCOPUS:85089517715
SN - 1053-587X
VL - 68
SP - 3754
EP - 3768
JO - IRE Transactions on Audio
JF - IRE Transactions on Audio
M1 - 9090330
ER -