{"id":"https://openalex.org/W7133294555","doi":"https://doi.org/10.1109/jsac.2026.3669875","title":"Secure Goal-Oriented Communication: Defending Against Eavesdropping Timing Attacks","display_name":"Secure Goal-Oriented Communication: Defending Against Eavesdropping Timing Attacks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133294555","doi":"https://doi.org/10.1109/jsac.2026.3669875"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2026.3669875","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3669875","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jsac.2026.3669875","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061523718","display_name":"Federico Mason","orcid":"https://orcid.org/0000-0001-5681-1695"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Federico Mason","raw_affiliation_strings":["Department of Information Engineering, University of Padua, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031458924","display_name":"Federico Chiariotti","orcid":"https://orcid.org/0000-0002-7915-7275"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Federico Chiariotti","raw_affiliation_strings":["Department of Information Engineering, University of Padua, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008963555","display_name":"Pietro Maria Talli","orcid":"https://orcid.org/0000-0002-7428-4531"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Pietro Talli","raw_affiliation_strings":["Department of Information Engineering, University of Padua, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008187510","display_name":"Andr\u00e9a Zanella","orcid":"https://orcid.org/0000-0003-3671-5190"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Zanella","raw_affiliation_strings":["Department of Information Engineering, University of Padua, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061523718"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4747677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"44","issue":null,"first_page":"3782","last_page":"3797"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.20389999449253082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.20389999449253082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.15399999916553497,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.09369999915361404,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8463000059127808},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7932000160217285},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5985000133514404},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.45190000534057617},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.4106000065803528},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.37560001015663147},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.36980000138282776},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.35910001397132874},{"id":"https://openalex.org/keywords/retransmission","display_name":"Retransmission","score":0.34209999442100525}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8916000127792358},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8463000059127808},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7932000160217285},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5985000133514404},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5620999932289124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5558000206947327},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.45190000534057617},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.4106000065803528},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.37560001015663147},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.36980000138282776},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.35910001397132874},{"id":"https://openalex.org/C180611318","wikidata":"https://www.wikidata.org/wiki/Q7316902","display_name":"Retransmission","level":3,"score":0.34209999442100525},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2955999970436096},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2896000146865845},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28200000524520874},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.27459999918937683},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jsac.2026.3669875","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3669875","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},{"id":"pmh:oai:www.research.unipd.it:11577/3589899","is_oa":false,"landing_page_url":"https://hdl.handle.net/11577/3589899","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1109/jsac.2026.3669875","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3669875","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2585369590","display_name":null,"funder_award_id":"RESTART program PE0000001","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1604037631","https://openalex.org/W1965209910","https://openalex.org/W2051203581","https://openalex.org/W2056045513","https://openalex.org/W2079820504","https://openalex.org/W2090930915","https://openalex.org/W2146852848","https://openalex.org/W2342508099","https://openalex.org/W2521231675","https://openalex.org/W2601738991","https://openalex.org/W2735852363","https://openalex.org/W2796125030","https://openalex.org/W2946889564","https://openalex.org/W2978348882","https://openalex.org/W2993383518","https://openalex.org/W3045572615","https://openalex.org/W3093689670","https://openalex.org/W4239466562","https://openalex.org/W4312286285","https://openalex.org/W4313455370","https://openalex.org/W4381415989","https://openalex.org/W4386025568","https://openalex.org/W4386387222","https://openalex.org/W4387870828","https://openalex.org/W4387885784","https://openalex.org/W4388739236","https://openalex.org/W4388936959","https://openalex.org/W4393185338","https://openalex.org/W4399426488","https://openalex.org/W4400680555","https://openalex.org/W4401242626","https://openalex.org/W4402129406","https://openalex.org/W4405351316","https://openalex.org/W4406138071","https://openalex.org/W4406858660","https://openalex.org/W4409077311","https://openalex.org/W4409224692","https://openalex.org/W4409310580","https://openalex.org/W4414158926","https://openalex.org/W7084106570"],"related_works":[],"abstract_inverted_index":{"Goal-oriented":[0],"Communication":[1],"(GoC)":[2],"is":[3,14],"a":[4,21,48,106,125,145,171],"new":[5],"paradigm":[6],"that":[7,52,123],"activates":[8],"data":[9],"transmission":[10],"only":[11],"when":[12],"it":[13,73],"instrumental":[15],"for":[16,96,109],"the":[17,27,31,40,59,62,75,111,114,128,135,150,155,161,168,175],"receiver":[18],"to":[19,26,39,57,152],"achieve":[20],"certain":[22],"goal.":[23],"This":[24,64],"leads":[25],"advantage":[28],"of":[29,33,61,66,77,101,113,137,160,174,177],"reducing":[30],"frequency":[32],"transmissions":[34],"significantly":[35],"while":[36,144],"maintaining":[37],"adherence":[38],"receiver\u2019s":[41],"objectives.":[42],"However,":[43],"GoC":[44,133,147],"scheduling":[45,95],"also":[46],"opens":[47],"timing-based":[49],"side":[50],"channel":[51],"an":[53,89],"eavesdropper":[54,151],"can":[55,166],"exploit":[56],"estimate":[58],"state":[60,157],"system.":[63],"type":[65],"attack":[67,91,115],"sidesteps":[68],"even":[69],"information-theoretic":[70],"security,":[71],"as":[72],"exploits":[74],"timing":[76],"updates":[78],"rather":[79],"than":[80],"their":[81],"content.":[82],"In":[83],"this":[84],"work,":[85],"we":[86],"study":[87],"such":[88],"eavesdropping":[90],"against":[92],"pull-based":[93],"goal-oriented":[94,178],"remote":[97],"monitoring":[98],"and":[99,116,134],"control":[100],"Markov":[102],"processes.":[103],"We":[104],"provide":[105,124],"theoretical":[107],"framework":[108],"defining":[110],"effectiveness":[112],"propose":[117],"possible":[118],"countermeasures,":[119],"including":[120],"three":[121],"heuristics":[122],"balance":[126],"between":[127],"performance":[129],"gains":[130],"offered":[131],"by":[132],"amount":[136],"leaked":[138],"information.":[139],"Our":[140],"results":[141],"show":[142],"that,":[143],"naive":[146],"scheduler":[148],"allows":[149],"correctly":[153],"guess":[154],"system":[156],"about":[158],"60%":[159],"time,":[162],"our":[163],"heuristic":[164],"defenses":[165],"halve":[167],"leakage":[169],"with":[170],"marginal":[172],"reduction":[173],"benefits":[176],"approaches.":[179]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2026-03-04T00:00:00"}
