Countermeasures for collusion attacks exploiting host signal redundancy