Goal-oriented Communication (GoC) is a new paradigm that activates data transmission only when it is instrumental for the receiver to achieve a certain goal. This leads to the advantage of reducing the frequency of transmissions significantly while maintaining adherence to the receiver’s objectives. However, GoC scheduling also opens a timing-based side channel that an eavesdropper can exploit to estimate the state of the system. This type of attack sidesteps even information-theoretic security, as it exploits the timing of updates rather than their content. In this work, we study such an eavesdropping attack against pull-based goal-oriented scheduling for remote monitoring and control of Markov processes. We provide a theoretical framework for defining the effectiveness of the attack and propose possible countermeasures, including three heuristics that provide a balance between the performance gains offered by GoC and the amount of leaked information. Our results show that, while a naive GoC scheduler allows the eavesdropper to correctly guess the system state about 60% of the time, our heuristic defenses can halve the leakage with a marginal reduction of the benefits of goal-oriented approaches.
Secure Goal-Oriented Communication: Defending Against Eavesdropping Timing Attacks
Mason, Federico
;Chiariotti, Federico;Zanella, Andrea
2026
Abstract
Goal-oriented Communication (GoC) is a new paradigm that activates data transmission only when it is instrumental for the receiver to achieve a certain goal. This leads to the advantage of reducing the frequency of transmissions significantly while maintaining adherence to the receiver’s objectives. However, GoC scheduling also opens a timing-based side channel that an eavesdropper can exploit to estimate the state of the system. This type of attack sidesteps even information-theoretic security, as it exploits the timing of updates rather than their content. In this work, we study such an eavesdropping attack against pull-based goal-oriented scheduling for remote monitoring and control of Markov processes. We provide a theoretical framework for defining the effectiveness of the attack and propose possible countermeasures, including three heuristics that provide a balance between the performance gains offered by GoC and the amount of leaked information. Our results show that, while a naive GoC scheduler allows the eavesdropper to correctly guess the system state about 60% of the time, our heuristic defenses can halve the leakage with a marginal reduction of the benefits of goal-oriented approaches.| File | Dimensione | Formato | |
|---|---|---|---|
|
Secure_Goal-Oriented_Communication_Defending_Against_Eavesdropping_Timing_Attacks.pdf
accesso aperto
Tipologia:
Published (Publisher's Version of Record)
Licenza:
Creative commons
Dimensione
2.39 MB
Formato
Adobe PDF
|
2.39 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.




