A probabilistic framework for jammer identification in MANETs

نویسندگان

  • Massimiliano Albanese
  • Alessandra De Benedictis
  • Sushil Jajodia
  • Don J. Torrieri
چکیده

Cyber Maneuver is envisioned as a way of increasing the robustness of imperfect systems by creating and deploying mechanisms that continually change a system’s attack surface. A particularly useful strategy against jamming attacks in Mobile Ad Hoc Networks (MANETs) entails using cyber-maneuver keys to supplement higher-level cryptographic keys. Such keys can be periodically changed either in a proactive fashion to defeat cryptanalytic efforts by external attackers or in a reactive fashion to exclude compromised internal nodes. In order to enable effective reactive rekeying, it is critical to correctly identify compromised nodes. In this paper, we propose a probabilistic framework for identifying jammers, based on the location of both jammed and non-jammed nodes. We are interested in finding the smallest set of nodes that need to be excluded to stop the attacks in a multi-jammer scenario. We show that this problem is NP-hard, and propose a polynomial-time heuristic algorithm to find approximate solutions. Experiments show that our approach works well in practice, and that the algorithm is efficient and achieves good precision and recall.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Graph-theoretic Framework for Identifying Trigger Nodes against Probabilistic Reactive Jamming Attacks

During the last decade, Reactive Jamming Attack has emerged as a greatest security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose transmissions invo...

متن کامل

A COMMON FRAMEWORK FOR LATTICE-VALUED, PROBABILISTIC AND APPROACH UNIFORM (CONVERGENCE) SPACES

We develop a general framework for various lattice-valued, probabilistic and approach uniform convergence spaces. To this end, we use the concept of $s$-stratified $LM$-filter, where $L$ and $M$ are suitable frames. A stratified $LMN$-uniform convergence tower is then a family of structures indexed by a quantale $N$. For different choices of $L,M$ and $N$ we obtain the lattice-valued, probabili...

متن کامل

Probabilistic Contaminant Source Identification in Water Distribution Infrastructure Systems

Large water distribution systems can be highly vulnerable to penetration of contaminant factors caused by different means including deliberate contamination injections. As contaminants quickly spread into a water distribution network, rapid characterization of the pollution source has a high measure of importance for early warning assessment and disaster management. In this paper, a methodology...

متن کامل

A Probabilistic Multicast with Universally Composable Anonymity in MANETs

Current anonymous routing protocols do not provide anonymous mechanism for multicast in MANETs and have only had ad-hoc anonymity analysis. This paper proposes a new scheme called probabilistic multicast with universally composable anonymity. One-Time key pair is used to keep a route record in privacy during route discovery processes. Gossip-Scheme, secret DH path and Bloom Filter are adopted t...

متن کامل

A Probabilistic Framework for Distributed Localization of Attackers in MANETs

Mobile Ad-hoc Networks (MANETs) are frequently exposed to a wide range of cyber threats due to their unique characteristics. The lack of a centralized monitoring and management entity and the dynamic nature of their topology pose new and interesting challenges for the design of security mechanisms for MANETs. While conventional methods primarily focus on detecting attacks, in this work we focus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Ad Hoc Networks

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2014