-
Covert Communication in Autoencoder Wireless Systems
Authors:
Ali Mohammadi Teshnizi,
Majid Ghaderi,
Dennis Goeckel
Abstract:
Hiding the wireless communication by transmitter Alice to intended receiver Bob from a capable and attentive adversary Willie has been widely studied under the moniker "covert communications". However, when such covert communication is done in the presence of allowable system communications, there has been little study of both hiding the signal and preserving the performance of those allowable com…
▽ More
Hiding the wireless communication by transmitter Alice to intended receiver Bob from a capable and attentive adversary Willie has been widely studied under the moniker "covert communications". However, when such covert communication is done in the presence of allowable system communications, there has been little study of both hiding the signal and preserving the performance of those allowable communications. Here, by treating Alice, Bob, and Willie as a generator, decoder, and discriminator neural network, we perform joint training in an adversarial setting to yield a covert communication scheme that can be added to any normal autoencoder. The method does not depend on the characteristics of the cover signal or the type of channel and it is developed for both single-user and multi-user systems. Numerical results indicate that we are able to establish a reliable undetectable channel between Alice and Bob, regardless of the cover signal or type of fading, and that the signal causes almost no disturbance to the ongoing normal operation of the system.
△ Less
Submitted 16 July, 2023;
originally announced July 2023.
-
DeepFlow: Abnormal Traffic Flow Detection Using Siamese Networks
Authors:
Sepehr Sabour,
Sanjeev Rao,
Majid Ghaderi
Abstract:
Nowadays, many cities are equipped with surveillance systems and traffic control centers to monitor vehicular traffic for road safety and efficiency. The monitoring process is mostly done manually which is inefficient and expensive. In recent years, several data-driven solutions have been proposed in the literature to automatically analyze traffic flow data using machine learning techniques. Howev…
▽ More
Nowadays, many cities are equipped with surveillance systems and traffic control centers to monitor vehicular traffic for road safety and efficiency. The monitoring process is mostly done manually which is inefficient and expensive. In recent years, several data-driven solutions have been proposed in the literature to automatically analyze traffic flow data using machine learning techniques. However, existing solutions require large and comprehensive datasets for training which are not readily available, thus limiting their application. In this paper, we develop a traffic anomaly detection system, referred to as DeepFlow, based on Siamese neural networks, which are suitable in scenarios where only small datasets are available for training. Our model can detect abnormal traffic flows by analyzing the trajectory data collected from the vehicles in a fleet. To evaluate DeepFlow, we use realistic vehicular traffic simulations in SUMO. Our results show that DeepFlow detects abnormal traffic patterns with an F1 score of 78%, while outperforming other existing approaches including: Dynamic Time War** (DTW), Global Alignment Kernels (GAK), and iForest.
△ Less
Submitted 26 August, 2021;
originally announced August 2021.
-
Multi-Hop Routing in Covert Wireless Networks
Authors:
Azadeh Sheikholeslami,
Majid Ghaderi,
Don Towsley,
Boulat A. Bash,
Saikat Guha,
Dennis Goeckel
Abstract:
In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi-ho…
▽ More
In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi-hop covert communication over a moderate size network and in the presence of multiple collaborating Willies is considered. The relays can transmit covertly using either a single key for all relays, or different independent keys at the relays. For each case, we develop efficient algorithms to find optimal paths with maximum throughput and minimum end-to-end delay between Alice and Bob. As expected, employing multiple hops significantly improves the ability to communicate covertly versus the case of a single-hop transmission. Furthermore, at the expense of more shared key bits, analytical results and numerical simulations demonstrate that multi-hop covert communication with different independent keys at the relays has better performance than multi-hop covert communication with a single key.
△ Less
Submitted 11 March, 2018;
originally announced March 2018.
-
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming
Authors:
Azadeh Sheikholeslami,
Majid Ghaderi,
Hossein Pishro-Nik,
Dennis Goeckel
Abstract:
This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guar…
▽ More
This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guarantee secrecy for any routing algorithm.
We develop an efficient (in terms of energy consumption and computational complexity) routing algorithm that does not rely on any information about the locations and CSIs of the eavesdroppers. Our algorithm guarantees secrecy even in disadvantaged wireless environments, where multiple eavesdroppers try to eavesdrop each message, are equipped with directional antennas, or can get arbitrarily close to the transmitter. The key is to employ additive random jamming to exploit inherent non-idealities of the eavesdropper's receiver, which makes the eavesdroppers incapable of recording the messages. We have simulated our proposed algorithm and compared it with existing secrecy routing algorithms in both single-hop and multi-hop networks. Our results indicate that when the uncertainty in the locations of eavesdroppers is high and/or in disadvantaged wireless environments, our algorithm outperforms existing algorithms in terms of energy consumption and secrecy.
△ Less
Submitted 15 March, 2017;
originally announced March 2017.
-
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming
Authors:
Azadeh Sheikholeslami,
Majid Ghaderi,
Hossein Pishro-Nik,
Dennis Goeckel
Abstract:
The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g. spread spectrum) to suppress jamming. However, wher…
▽ More
The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer techniques (e.g. spread spectrum) to suppress jamming. However, whereas these approaches can provide significant gains, the residual jamming can still severely limit system performance. This motivates the consideration of routing approaches that account for the differences in the jamming environment between different paths. First, we take a straightforward approach where an equal outage probability is allocated to each link along a path and develop a minimum energy routing solution. Next, we demonstrate the shortcomings of this approach and then consider the joint problem of outage allocation and routing by employing an approximation to the link outage probability. This yields an efficient and effective routing algorithm that only requires knowledge of the measured jamming at each node. Numerical results demonstrate that the amount of energy saved by the proposed methods with respect to a standard minimum energy routing algorithm, especially for parameters appropriate for terrestrial wireless networks, is substantial.
△ Less
Submitted 13 September, 2016; v1 submitted 13 November, 2014;
originally announced November 2014.
-
On the Scalability of Reliable Data Transfer in High Speed Networks
Authors:
Majid Ghaderi,
Don Towsley
Abstract:
This paper considers reliable data transfer in a high-speed network (HSN) in which the per-connection capacity is very large. We focus on sliding window protocols employing selective repeat for reliable data transfer and study two reliability mechanisms based on ARQ and FEC. The question we ask is which mechanism is more suitable for an HSN in which the scalability of reliable data transfer in ter…
▽ More
This paper considers reliable data transfer in a high-speed network (HSN) in which the per-connection capacity is very large. We focus on sliding window protocols employing selective repeat for reliable data transfer and study two reliability mechanisms based on ARQ and FEC. The question we ask is which mechanism is more suitable for an HSN in which the scalability of reliable data transfer in terms of receiver's buffer requirement and achievable delay and throughput is a concern. To efficiently utilize the large bandwidth available to a connection in an HSN, sliding window protocols require a large transmission window. In this regime of large transmission windows, we show that while both mechanisms achieve the same asymptotic throughput in the presence of packet losses, their delay and buffer requirements are different. Specifically, an FEC-based mechanism has delay and receiver's buffer requirement that are asymptotically smaller than that of an ARQ-based selective repeat mechanism by a factor of log W, where W is the window size of the selective repeat mechanism. This result is then used to investigate the implications of each reliability mechanism on protocol design in an HSN in terms of throughput, delay, buffer requirement, and control overhead.
△ Less
Submitted 26 July, 2013;
originally announced July 2013.
-
Efficient Wireless Security Through Jamming, Coding and Routing
Authors:
Majid Ghaderi,
Dennis Goeckel,
Ariel Orda,
Mostafa Dehghan
Abstract:
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with h…
▽ More
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an epsilon-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.
△ Less
Submitted 9 April, 2013;
originally announced April 2013.
-
An approximate solution of the MHD Falkner-Skan flow by Hermite functions pseudospectral method
Authors:
K. Parand,
A. R. Rezaei,
S. M. Ghaderi
Abstract:
Based on a new approximation method, namely pseudospectral method, a solution for the three order nonlinear ordinary differential laminar boundary layer Falkner-Skan equation has been obtained on the semi-infinite domain. The proposed approach is equipped by the orthogonal Hermite functions that have perfect properties to achieve this goal. This method solves the problem on the semi-infinite domai…
▽ More
Based on a new approximation method, namely pseudospectral method, a solution for the three order nonlinear ordinary differential laminar boundary layer Falkner-Skan equation has been obtained on the semi-infinite domain. The proposed approach is equipped by the orthogonal Hermite functions that have perfect properties to achieve this goal. This method solves the problem on the semi-infinite domain without truncating it to a finite domain and transforming domain of the problem to a finite domain. In addition, this method reduces solution of the problem to solution of a system of algebraic equations. We also present the comparison of this work with numerical results and show that the present method is applicable.
△ Less
Submitted 16 August, 2010; v1 submitted 13 August, 2010;
originally announced August 2010.