Detecting Active Attacks in Over-the-Air Computation using Dummy Samples (2312.08950v1)
Abstract: Over-the-Air (OtA) computation is a newly emerged concept for computing functions of data from distributed nodes by taking advantage of the wave superposition property of wireless channels. Despite its advantage in communication efficiency, OtA computation is associated with significant security and privacy concerns that have so far not been thoroughly investigated, especially in the case of active attacks. In this paper, we propose and evaluate a detection scheme against active attacks in OtA computation systems. More explicitly, we consider an active attacker which is an external node sending random or misleading data to alter the aggregated data received by the server. To detect the presence of the attacker, in every communication period, legitimate users send some dummy samples in addition to the real data. We propose a detector design that relies on the existence of a shared secret only known by the legitimate users and the server, that can be used to hide the transmitted signal in a secret subspace. After the server projects the received vector back to the original subspace, the dummy samples can be used to detect active attacks. We show that this design achieves good detection performance for a small cost in terms of channel resources.
- Z. Chen, E. G. Larsson, C. Fischione, M. Johansson, and Y. Malitsky, “Over-the-air computation for distributed systems: Something old and something new,” IEEE Network, 2023.
- A. Şahin and R. Yang, “A survey on over-the-air computation,” IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1877–1908, 2023.
- B. Nazer and M. Gastpar, “Computation over multiple-access channels,” IEEE Transactions on Information Theory, vol. 53, pp. 3498–3516, 2007.
- G. Zhu, J. Xu, K. Huang, and S. Cui, “Over-the-air computing for wireless data aggregation in massive IoT,” IEEE Wireless Communications, vol. 28, no. 4, pp. 57–65, 2021.
- Z. Wang, Y. Zhao, Y. Zhou, Y. Shi, C. Jiang, and K. B. Letaief, “Over-the-air computation: Foundations, technologies, and applications,” arXiv preprint arXiv:2210.10524, 2022.
- M. Frey, I. Bjelaković, and S. Stańczak, “Towards secure over-the-air computation,” in IEEE International Symposium on Information Theory (ISIT), 2021, pp. 700–705.
- L. Maßny and A. Wachter-Zeh, “Secure over-the-air computation using zero-forced artificial noise,” in IEEE Information Theory Workshop (ITW). IEEE, 2023, pp. 221–226.
- J. Liao, Z. Chen, and E. G. Larsson, “Over-the-air federated learning with privacy protection via correlated additive perturbations,” in 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2022.
- H. Sifaou and G. Y. Li, “Robust federated learning via over-the-air computation,” in IEEE 32nd International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, 2022.
- H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” IEEE communications surveys & tutorials, vol. 24, no. 2, pp. 767–809, 2022.
- G. Marti and C. Studer, “Universal MIMO jammer mitigation via secret temporal subspace embeddings,” Asilomar Conference on Signals, Systems, and Computers, arXiv preprint arXiv:2305.01260, 2023.
- M. Goldenbaum, S. Stanczak, and M. Kaliszan, “On function computation via wireless sensor multiple-access channels,” in IEEE Wireless Communications and Networking Conference, 2009.
- M. Goldenbaum, H. Boche, and S. Stańczak, “Harnessing interference for analog function computation in wireless sensor networks,” IEEE Transactions on Signal Processing, vol. 61, no. 20, pp. 4893–4906, 2013.
- F. Mezzadri, “How to generate random matrices from the classical compact groups,” arXiv preprint math-ph/0609050, 2006.