Of malicious motes and suspicious sensors
نویسندگان
چکیده
How efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β—unknown to the honest players. We show that communication can be delayed for 2β + Θ(lg |V |) rounds, where V is the set of values that the honest players may transmit. We then derive, via reduction to this 3-player game, round complexity lower bounds for several classical n-player problems: 2β+Ω(lg |V |) for reliable broadcast, 2β + Ω(log n) for leader election, and 2β + Ω(k lg |V |/k) for static kselection. We also consider an extension of our adversary model that includes up to t crash failures. Herewe showa bound of 2β+Θ(t) rounds for binary consensus.We provide tight, or nearly tight, upper bounds for all four problems. From these resultswe canderive bounds on the efficiency of malicious disruption, stated in terms of two newmetrics: jamming gain (the ratio of rounds delayed to adversarial broadcasts) and disruption-free complexity (the rounds required to terminate in the special case of no disruption). Two key conclusions of this study: (1) all the problems considered feature semantic vulnerabilities that allow an adversary to disrupt termination more efficiently than simple jamming (i.e., all have a jamming gain greater than1); and (2) for all the problems considered, the round complexity grows linearly with the number of bits to be communicated (i.e., all have a Ω(lg |V |) or Ω(lg n) disruption-free complexity.) © 2008 Elsevier B.V. All rights reserved.
منابع مشابه
Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks
How efficiently can a malicious device disrupt communication in a wireless network? Imagine a basic game involving two honest players, Alice and Bob, who want to exchange information, and an adversary, Collin, who can disrupt communication using a limited budget of β broadcasts. How long can Collin delay Alice and Bob from communicating? In fact, the trials and tribulations of Alice and Bob cap...
متن کاملCommunity variations in hoax calls and suspicious fires: Geographic, temporal and socio-economic dimensions and trajectories
This is a project supported by a grant from the Criminology Research Grants. The views expressed are the responsibility of the author and are not necessarily those of the Council. Descriptive mapping and analysis of malicious hoax calls 38 Descriptive mapping and analysis of suspicious fires 46 Summary of descriptive mapping and analysis 53 Understanding the dynamics of suspicious fires and mal...
متن کاملProviding a Method to Identify Malicious Users in Electronic Banking System Using Fuzzy Clustering Techniques
Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...
متن کاملProviding a Method to Identify Malicious Users in Electronic Banking System Using Fuzzy Clustering Techniques
Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کامل