抗干扰分子通信方案

IF 2.4 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Transactions on Molecular, Biological, and Multi-Scale Communications Pub Date : 2024-07-22 DOI:10.1109/TMBMC.2024.3426920
Sahar Shahbaz;Mahtab Mirmohseni;Masoumeh Nasiri-Kenari
{"title":"抗干扰分子通信方案","authors":"Sahar Shahbaz;Mahtab Mirmohseni;Masoumeh Nasiri-Kenari","doi":"10.1109/TMBMC.2024.3426920","DOIUrl":null,"url":null,"abstract":"The sensitivity of many in vivo applications necessitates investigating adversarial activities in micro-scale MC systems. On the other hand, macro-scale applications of MC are easier to launch security attacks on. In this paper, we study the problem of jamming attacks in MC, where a concentration transmitter releases a particular type of molecule to send its message over a diffusive channel to a transparent receiver. A jammer wishes to disrupt the communication either by transmitting the same molecule type or a reacting molecule type. We propose jamming-resistant coding schemes to counteract this attack. For this purpose, three jamming models based on different capabilities of attackers and their possible strategies are introduced. The difference of jamming models relates to existence of sensing and learning capabilities. For two jammer types, our coding approaches are based on splitting each time slot into subslots, where a random pre-shared pattern is used to determine the transmit strategy in these subslots. The coding scheme against the third jammer type, which is the strongest one, is designed based on error correction codes with maximum Hamming distance. To analyse the performances of the proposed schemes, we derive the probability of error at the receiver. The results of the proposed schemes against the first and the second types of jammers confirm their effectiveness in protecting against jamming attacks. For example, in the specific case of the jammer channel and main channel discussed in the results section, we achieve an almost 78% reduction in the probability of errors at the receiver compared to a non-coded system when facing the first type of jammer. The third type of jammer represents the worst-case attack scenario, and its performance can be used as an upper bound for system performance.","PeriodicalId":36530,"journal":{"name":"IEEE Transactions on Molecular, Biological, and Multi-Scale Communications","volume":"10 4","pages":"534-548"},"PeriodicalIF":2.4000,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Jamming-Resistant Molecular Communication Scheme\",\"authors\":\"Sahar Shahbaz;Mahtab Mirmohseni;Masoumeh Nasiri-Kenari\",\"doi\":\"10.1109/TMBMC.2024.3426920\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The sensitivity of many in vivo applications necessitates investigating adversarial activities in micro-scale MC systems. On the other hand, macro-scale applications of MC are easier to launch security attacks on. In this paper, we study the problem of jamming attacks in MC, where a concentration transmitter releases a particular type of molecule to send its message over a diffusive channel to a transparent receiver. A jammer wishes to disrupt the communication either by transmitting the same molecule type or a reacting molecule type. We propose jamming-resistant coding schemes to counteract this attack. For this purpose, three jamming models based on different capabilities of attackers and their possible strategies are introduced. The difference of jamming models relates to existence of sensing and learning capabilities. For two jammer types, our coding approaches are based on splitting each time slot into subslots, where a random pre-shared pattern is used to determine the transmit strategy in these subslots. The coding scheme against the third jammer type, which is the strongest one, is designed based on error correction codes with maximum Hamming distance. To analyse the performances of the proposed schemes, we derive the probability of error at the receiver. The results of the proposed schemes against the first and the second types of jammers confirm their effectiveness in protecting against jamming attacks. For example, in the specific case of the jammer channel and main channel discussed in the results section, we achieve an almost 78% reduction in the probability of errors at the receiver compared to a non-coded system when facing the first type of jammer. The third type of jammer represents the worst-case attack scenario, and its performance can be used as an upper bound for system performance.\",\"PeriodicalId\":36530,\"journal\":{\"name\":\"IEEE Transactions on Molecular, Biological, and Multi-Scale Communications\",\"volume\":\"10 4\",\"pages\":\"534-548\"},\"PeriodicalIF\":2.4000,\"publicationDate\":\"2024-07-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Molecular, Biological, and Multi-Scale Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10606147/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Molecular, Biological, and Multi-Scale Communications","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10606147/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

许多体内应用的敏感性需要研究微尺度MC系统中的对抗活动。另一方面,MC的宏观应用更容易受到安全攻击。在本文中,我们研究了MC中的干扰攻击问题,其中浓度发射器释放特定类型的分子,通过扩散通道将其信息发送给透明接收器。干扰者希望通过传输相同分子类型或反应分子类型来破坏通信。我们提出了抗干扰编码方案来对抗这种攻击。为此,介绍了三种基于攻击者不同能力的干扰模型及其可能的干扰策略。干扰模型的不同与感知能力和学习能力的存在有关。对于两种类型的干扰机,我们的编码方法是基于将每个时隙划分为子时隙,其中使用随机预共享模式来确定这些子时隙中的传输策略。基于最大汉明距离的纠错码设计了针对第三种干扰机的编码方案,这是最强的一种。为了分析所提方案的性能,我们推导了接收端的误差概率。针对第一类和第二类干扰机所提出的方案的结果证实了它们在防止干扰攻击方面的有效性。例如,在结果部分讨论的干扰器信道和主信道的具体情况下,当面对第一种类型的干扰器时,与非编码系统相比,我们实现了接收器错误概率降低近78%。第三种类型的干扰机代表了最坏的攻击情况,其性能可以作为系统性能的上界。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Jamming-Resistant Molecular Communication Scheme
The sensitivity of many in vivo applications necessitates investigating adversarial activities in micro-scale MC systems. On the other hand, macro-scale applications of MC are easier to launch security attacks on. In this paper, we study the problem of jamming attacks in MC, where a concentration transmitter releases a particular type of molecule to send its message over a diffusive channel to a transparent receiver. A jammer wishes to disrupt the communication either by transmitting the same molecule type or a reacting molecule type. We propose jamming-resistant coding schemes to counteract this attack. For this purpose, three jamming models based on different capabilities of attackers and their possible strategies are introduced. The difference of jamming models relates to existence of sensing and learning capabilities. For two jammer types, our coding approaches are based on splitting each time slot into subslots, where a random pre-shared pattern is used to determine the transmit strategy in these subslots. The coding scheme against the third jammer type, which is the strongest one, is designed based on error correction codes with maximum Hamming distance. To analyse the performances of the proposed schemes, we derive the probability of error at the receiver. The results of the proposed schemes against the first and the second types of jammers confirm their effectiveness in protecting against jamming attacks. For example, in the specific case of the jammer channel and main channel discussed in the results section, we achieve an almost 78% reduction in the probability of errors at the receiver compared to a non-coded system when facing the first type of jammer. The third type of jammer represents the worst-case attack scenario, and its performance can be used as an upper bound for system performance.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.90
自引率
13.60%
发文量
23
期刊介绍: As a result of recent advances in MEMS/NEMS and systems biology, as well as the emergence of synthetic bacteria and lab/process-on-a-chip techniques, it is now possible to design chemical “circuits”, custom organisms, micro/nanoscale swarms of devices, and a host of other new systems. This success opens up a new frontier for interdisciplinary communications techniques using chemistry, biology, and other principles that have not been considered in the communications literature. The IEEE Transactions on Molecular, Biological, and Multi-Scale Communications (T-MBMSC) is devoted to the principles, design, and analysis of communication systems that use physics beyond classical electromagnetism. This includes molecular, quantum, and other physical, chemical and biological techniques; as well as new communication techniques at small scales or across multiple scales (e.g., nano to micro to macro; note that strictly nanoscale systems, 1-100 nm, are outside the scope of this journal). Original research articles on one or more of the following topics are within scope: mathematical modeling, information/communication and network theoretic analysis, standardization and industrial applications, and analytical or experimental studies on communication processes or networks in biology. Contributions on related topics may also be considered for publication. Contributions from researchers outside the IEEE’s typical audience are encouraged.
期刊最新文献
2024 Index IEEE Transactions on Molecular, Biological, and Multi-Scale Communications Vol. 10 Table of Contents IEEE Transactions on Molecular, Biological, and Multi-Scale Communications Publication Information Guest Editorial Special Feature on Quantum Biology: Series II IEEE Communications Society Information
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1