Surviving Attacks in Challenged Networks
2012 (English)In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 9, no 6, 917-929 p.Article in journal (Refereed) Published
In the event of a disaster, telecommunication infrastructures can be severely damaged or overloaded. Hastily formed networks can provide communication services in an ad hoc manner. These networks are challenging due to the chaotic context where intermittent connection is the norm and the identity and number of participants cannot be assumed. In such environments malicious actors may try to disrupt the communications to create more chaos for their own benefit. This paper proposes a general security framework for monitoring and reacting to disruptive attacks. It includes a collection of functions to detect anomalies, diagnose them, and perform mitigation. The measures are deployed in each node in a fully distributed fashion, but their collective impact is a significant resilience to attacks, so the actors can disseminate information under adverse conditions. The approach is evaluated in the context of a simulated disaster area network with a many-cast dissemination protocol, Random Walk Gossip, with a store-and-forward mechanism. A challenging threat model where adversaries may 1) try to drain the resources both at node level (battery life) and network level (bandwidth), or 2) reduce message dissemination in their vicinity, without spending much of their own energy, is adopted. The results demonstrate that the approach diminishes the impact of the attacks considerably.
Place, publisher, year, edition, pages
IEEE Computer Society, 2012. Vol. 9, no 6, 917-929 p.
Computer and Information Science
IdentifiersURN: urn:nbn:se:liu:diva-80277DOI: 10.1109/TDSC.2012.67ISI: 000308754300011OAI: oai:DiVA.org:liu-80277DiVA: diva2:546396
funding agencies|Swedish Civil Contingencies Agency (MSB)||national Graduate school in computer science (CUGS)||project Hastily Formed Networks|37|2012-08-232012-08-232015-03-02