论文标题
对RIS辅助沟通的控制器操纵攻击的设计和检测
Design and Detection of Controller Manipulation Attack on RIS Assisted Communication
论文作者
论文摘要
在本文中,我们在可重构的智能表面(RIS)辅助通信系统上引入了一种名为Controller操纵攻击(CMA)的新攻击,在发射器和接收器之间。攻击者有能力操纵RIS控制器并修改RIS元素引起的相移。攻击者的目的是最大程度地降低接收器的数据速率,但要限制接收器的攻击检测概率。我们考虑了许多攻击检测模型:(i)在给定褪色块中基于复合假设检测的攻击检测,(ii)在给定衰落块中对CMA的最快检测已知的通道增长,(iii)非参数假设测试,以检测CMA的多个频道多个可能的频道,以多种范围的范围,以多种范围的范围(IV)(IV)(IIV)(IV)。褪色块。在第一种情况下,简单的能量探测器原来是最强大的(UMP)。在第二种情况下,获得了标准库司测试及其性能界限的简化。在第三种情况下,非参数Kolmogorov-Smirnov测试将进一步简化为简单的每样本双阈值测试。针对这三个探测器的攻击是通过新颖的优化配方和基于半决赛松弛的解决方案设计的。在第四种情况下,我们考虑使用SNR矩进行阈值检测。对于大型RI,在没有攻击下进行的各种SNR矩,然后用来将攻击设计问题作为线性程序提出。最后,数值结果说明了与攻击方案相关的性能和权衡,也证明了它们的功效。
In this paper, we introduce a new attack called controller manipulation attack (CMA) on a Reconfigurable Intelligent Surface (RIS) assisted communication system between a transmitter and a receiver. An attacker has the capability to manipulate the RIS controller and modify the phase shift induced by the RIS elements. The goal of the attacker is to minimize the data rate at the receiver, subject to a constraint on the attack detection probability at the receiver. We consider a number of attack detection models: (i) composite hypothesis testing based attack detection in a given fading block for known channel gains, (ii) sequential quickest detection of CMA in a given fading block for known channel gains, (iii) nonparametric hypothesis test to detect CMA for unknown channel gains over a fading block, and (iv) signal-to-noise-ratio (SNR) moment based detection over possibly multiple fading blocks. In the first case, a simple energy detector turns out to be uniformly most powerful (UMP). In the second case, simplification of the standard CUSUM test and its performance bounds are obtained. In the third case, non-parametric Kolmogorov-Smirnov test is further simplified to a simple per-sample double threshold test. The attack against these three detectors are designed via novel optimization formulations and semidefinite relaxation based solutions. In the fourth case, we consider threshold detection using moments of SNR; various SNR moments under no attack are obtained analytically for large RIS and then used to formulate the attack design problem as a linear program. Finally, numerical results illustrate the performance and trade-offs associated with the attack schemes, and also demonstrate their efficacy.