{"id":"https://openalex.org/W4386066355","doi":"https://doi.org/10.1109/isit54713.2023.10206911","title":"Detectability of Denial-of-Service Attacks on Arbitrarily Varying Channels with State Constraints","display_name":"Detectability of Denial-of-Service Attacks on Arbitrarily Varying Channels with State Constraints","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4386066355","doi":"https://doi.org/10.1109/isit54713.2023.10206911"},"language":"en","primary_location":{"id":"doi:10.1109/isit54713.2023.10206911","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isit54713.2023.10206911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011638668","display_name":"Christian Arendt","orcid":"https://orcid.org/0000-0003-4881-9800"},"institutions":[{"id":"https://openalex.org/I1283382300","display_name":"BMW (Germany)","ror":"https://ror.org/05vs9tj88","country_code":"DE","type":"company","lineage":["https://openalex.org/I1283382300","https://openalex.org/I4210156768"]},{"id":"https://openalex.org/I4210156768","display_name":"BMW Group (Germany)","ror":"https://ror.org/044kkbh92","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210156768"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Christian Arendt","raw_affiliation_strings":["BMW Group,M&#x00FC;nchen,Germany,80788"],"affiliations":[{"raw_affiliation_string":"BMW Group,M&#x00FC;nchen,Germany,80788","institution_ids":["https://openalex.org/I1283382300","https://openalex.org/I4210156768"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081460736","display_name":"Janis N\u00f6tzel","orcid":"https://orcid.org/0000-0003-0091-3072"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Janis N\u00f6tzel","raw_affiliation_strings":["Technische Universit&#x00E4;t M&#x00FC;nchen,Lehrstuhl f&#x00FC;r Theoretische Informationstechnik,M&#x00FC;nchen,Germany,80290"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t M&#x00FC;nchen,Lehrstuhl f&#x00FC;r Theoretische Informationstechnik,M&#x00FC;nchen,Germany,80290","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000732219","display_name":"Holger Boche","orcid":"https://orcid.org/0000-0002-8375-8946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Holger Boche","raw_affiliation_strings":["Technische Universit&#x00E4;t M&#x00FC;nchen,Lehrstuhl f&#x00FC;r Theoretische Informationstechnik,M&#x00FC;nchen,Germany,80290"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t M&#x00FC;nchen,Lehrstuhl f&#x00FC;r Theoretische Informationstechnik,M&#x00FC;nchen,Germany,80290","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011638668"],"corresponding_institution_ids":["https://openalex.org/I1283382300","https://openalex.org/I4210156768"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08623073,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2416","last_page":"2421"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138172626495361},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7164344787597656},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7135136723518372},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6017411947250366},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5743982791900635},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.512545108795166},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5114352107048035},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5016188621520996},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44428104162216187},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.42510661482810974},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34525877237319946},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1698145866394043},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15394166111946106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138172626495361},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7164344787597656},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7135136723518372},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6017411947250366},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5743982791900635},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.512545108795166},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5114352107048035},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5016188621520996},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44428104162216187},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.42510661482810974},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34525877237319946},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1698145866394043},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15394166111946106},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit54713.2023.10206911","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/isit54713.2023.10206911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1724726","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1724726","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"ConferencePaper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6100000143051147}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311649","display_name":"Ministry of Education","ror":"https://ror.org/036nq5137"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1497475168","https://openalex.org/W1509579779","https://openalex.org/W1977616096","https://openalex.org/W1989102762","https://openalex.org/W1994481523","https://openalex.org/W2022731279","https://openalex.org/W2056414301","https://openalex.org/W2103555005","https://openalex.org/W2122292841","https://openalex.org/W2126160338","https://openalex.org/W2138129780","https://openalex.org/W2936311121","https://openalex.org/W2957390596","https://openalex.org/W2962961028","https://openalex.org/W3021198511","https://openalex.org/W3203982010","https://openalex.org/W3207722348","https://openalex.org/W4220730257","https://openalex.org/W4234484870","https://openalex.org/W4285151644","https://openalex.org/W4302366875","https://openalex.org/W4365790375","https://openalex.org/W4367044281"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Sixth":[0],"Generation":[1],"(6G)":[2],"wireless":[3,32],"networks":[4],"will":[5],"become":[6],"the":[7,11,37,63,93,109],"system-critical":[8],"infrastructure":[9],"for":[10],"modern":[12],"information":[13,41],"society.":[14],"For":[15],"this":[16,73],"reason,":[17],"6G":[18],"communication":[19,33,64],"schemes":[20],"must":[21,77],"fulfill":[22],"resilience":[23,88],"by":[24,52,89],"design.":[25,90],"Because":[26],"of":[27,95,111,114],"its":[28],"probabilistic":[29],"nature,":[30],"a":[31,43,46,83,99],"link":[34],"varies":[35],"in":[36,98],"ability":[38],"to":[39,45,57,80,86],"transfer":[40],"from":[42],"transmitter":[44],"legitimate":[47],"receiver.":[48],"Additionally,":[49],"interference":[50],"generated":[51],"malicious":[53],"nodes":[54],"performing":[55],"attacks":[56,97,116],"achieve":[58],"Denial-of-Service":[59],"(DoS)":[60],"may":[61],"corrupt":[62],"link.":[65],"The":[66,75],"Arbitrarily":[67],"Varying":[68],"Channel":[69],"(AVC)":[70],"model":[71],"captures":[72],"vulnerability.":[74],"network":[76],"be":[78],"able":[79],"algorithmically":[81],"detect":[82],"DoS":[84,115],"attack":[85],"ensure":[87],"We":[91,106],"investigate":[92],"detectability":[94],"these":[96],"detection":[100,113],"framework":[101],"based":[102],"on":[103],"Turing":[104],"computability.":[105],"show":[107],"that":[108],"task":[110],"algorithmic":[112],"is":[117],"infeasible":[118],"when":[119],"communicating":[120],"over":[121],"AVCs":[122],"with":[123],"state":[124],"constraints.":[125]},"counts_by_year":[],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
