Goal-oriented Communication (GoC) is a new paradigm that activates data transmission only when it is instrumental for the receiver to achieve a certain goal. This leads to the advantage of reducing the frequency of transmissions significantly while maintaining adherence to the receiver’s objectives. However, GoC scheduling also opens a timing-based side channel that an eavesdropper can exploit to estimate the state of the system. This type of attack sidesteps even information-theoretic security, as it exploits the timing of updates rather than their content. In this work, we study such an eavesdropping attack against pull-based goal-oriented scheduling for remote monitoring and control of Markov processes. We provide a theoretical framework for defining the effectiveness of the attack and propose possible countermeasures, including three heuristics that provide a balance between the performance gains offered by GoC and the amount of leaked information. Our results show that, while a naive GoC scheduler allows the eavesdropper to correctly guess the system state about 60% of the time, our heuristic defenses can halve the leakage with a marginal reduction of the benefits of goal-oriented approaches.

Secure Goal-Oriented Communication: Defending Against Eavesdropping Timing Attacks

Mason, Federico
;
Zanella, Andrea
2026

Abstract

Goal-oriented Communication (GoC) is a new paradigm that activates data transmission only when it is instrumental for the receiver to achieve a certain goal. This leads to the advantage of reducing the frequency of transmissions significantly while maintaining adherence to the receiver’s objectives. However, GoC scheduling also opens a timing-based side channel that an eavesdropper can exploit to estimate the state of the system. This type of attack sidesteps even information-theoretic security, as it exploits the timing of updates rather than their content. In this work, we study such an eavesdropping attack against pull-based goal-oriented scheduling for remote monitoring and control of Markov processes. We provide a theoretical framework for defining the effectiveness of the attack and propose possible countermeasures, including three heuristics that provide a balance between the performance gains offered by GoC and the amount of leaked information. Our results show that, while a naive GoC scheduler allows the eavesdropper to correctly guess the system state about 60% of the time, our heuristic defenses can halve the leakage with a marginal reduction of the benefits of goal-oriented approaches.
2026
   RESearch and innovation on future Telecommunications systems and networks, to make Italy more smART - Spoke 6
   RESTART
   Ministero dell'Università e della Ricerca
   PNRR M4C2 Investimento 1.3 PARTENARIATI ESTESI A UNIVERSITÀ, CENTRI DI RICERCA, IMPRESE E FINANZIAMENTO PROGETTI DI RICERCA
   PE0000001
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3589899
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
  • OpenAlex 0
social impact