Skip to main content
Top

2016 | OriginalPaper | Chapter

A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks

Authors : Zhuo Lu, Cliff Wang, Mingkui Wei

Published in: Cyber Deception

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles of nodes are non-homogeneous; i.e., they are not equally important. This, however, opens a door for an adversary to target important nodes in the network by identifying their roles. In this chapter, we focus on investigating an important open question: how to detect and conceal the roles of nodes in wireless networks? Answers to this question are of essential importance to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis and simulations that it is feasible and even accurate to identify critical roles of nodes by looking at network traffic patterns. To provide countermeasures against role detection, we propose role concealment methods based on proactive and deceptive network strategies. We use simulations to evaluate the effectiveness and costs of the role concealment methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
For the sake of notation simplicity, we consider undirected links in this chapter. We note that the directed link case does not affect any formulation in this chapter and thus is a straightforward extension.
 
Literature
1.
go back to reference Bar-Noy A, Cirincione G, Govindan R, Krishnamurthy S, LaPorta T, Mohapatra P, Neely M, Yener A (2011) Quality-of-information aware networking for tactical military networks. In: Proc. of IEEE IEEE International Conference on Pervasive Computing and Communications (PERCOM) Workshops, pp 2–7 Bar-Noy A, Cirincione G, Govindan R, Krishnamurthy S, LaPorta T, Mohapatra P, Neely M, Yener A (2011) Quality-of-information aware networking for tactical military networks. In: Proc. of IEEE IEEE International Conference on Pervasive Computing and Communications (PERCOM) Workshops, pp 2–7
2.
go back to reference Bu T, Duffield N, Presti FL, Towsley D (2002) Network tomography on general topologies. In: Proc. of ACM SIGMETRICSCrossRef Bu T, Duffield N, Presti FL, Towsley D (2002) Network tomography on general topologies. In: Proc. of ACM SIGMETRICSCrossRef
3.
go back to reference Candes E, Romberg J, Tao T (2005) Stable signal recovery from incomplete and inaccurate information. Communications on Pure and Applied Mathematics pp 1207–1233 Candes E, Romberg J, Tao T (2005) Stable signal recovery from incomplete and inaccurate information. Communications on Pure and Applied Mathematics pp 1207–1233
4.
go back to reference Candes E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Information Theory 52:489–509MathSciNetCrossRefMATH Candes E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Information Theory 52:489–509MathSciNetCrossRefMATH
5.
6.
go back to reference Chen A, Cao J, Bu T (2010) Network tomography: Identifiability and fourier domain estimation. IEEE Trans Signal Processing 58:6029–6039MathSciNetCrossRef Chen A, Cao J, Bu T (2010) Network tomography: Identifiability and fourier domain estimation. IEEE Trans Signal Processing 58:6029–6039MathSciNetCrossRef
7.
go back to reference Elmasry GF (2010) A comparative review of commercial vs. tactical wireless networks. IEEE Communications Magazine 48(10):54–59CrossRef Elmasry GF (2010) A comparative review of commercial vs. tactical wireless networks. IEEE Communications Magazine 48(10):54–59CrossRef
8.
go back to reference Elmasry GF, McCann CJ, Welsh R (2005) Partitioning QoS management for secure tactical wireless ad hoc networks. IEEE Communications Magazine 43(11):116–123CrossRef Elmasry GF, McCann CJ, Welsh R (2005) Partitioning QoS management for secure tactical wireless ad hoc networks. IEEE Communications Magazine 43(11):116–123CrossRef
9.
go back to reference Friedlander MP, Saunders MA (2008) Active-set methods for basis pursuit. In: Proc. of West Coast Optimization Meeting (WCOM) Friedlander MP, Saunders MA (2008) Active-set methods for basis pursuit. In: Proc. of West Coast Optimization Meeting (WCOM)
10.
go back to reference Horton JD, Lopez-Ortiz A (2003) On the number of distributed measurement points for network tomography. In: Proc. of ACM SIGCOMM Internet Measurement Conference (IMC), pp 204–209 Horton JD, Lopez-Ortiz A (2003) On the number of distributed measurement points for network tomography. In: Proc. of ACM SIGCOMM Internet Measurement Conference (IMC), pp 204–209
11.
go back to reference Kidston D, Shi M (2012) A multicast routing technique for tactical networks. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–6 Kidston D, Shi M (2012) A multicast routing technique for tactical networks. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–6
12.
go back to reference Kunz T, Li L (2010) Broadcasting in multihop mobile tactical networks: To network code or not. In: Proc. of The International Wireless Communications and Mobile Computing Conference (IWCMC), pp 676–680 Kunz T, Li L (2010) Broadcasting in multihop mobile tactical networks: To network code or not. In: Proc. of The International Wireless Communications and Mobile Computing Conference (IWCMC), pp 676–680
13.
go back to reference Kunz T, Li L (2014) Robust broadcasting in tactical networks using network coding. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1213–1222 Kunz T, Li L (2014) Robust broadcasting in tactical networks using network coding. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1213–1222
14.
go back to reference Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–7 Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–7
15.
go back to reference Lu Z, Wang C (Apr. 2015) Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM) Lu Z, Wang C (Apr. 2015) Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM)
16.
go back to reference Lu Z, Wang C, Wei M (Oct. 2015) On detection and concealment of critical roles in tactical wireless networks. In: Proc. of IEEE Conference on Military Communications (MILCOM) Lu Z, Wang C, Wei M (Oct. 2015) On detection and concealment of critical roles in tactical wireless networks. In: Proc. of IEEE Conference on Military Communications (MILCOM)
18.
go back to reference Soule A, Lakhina A, Taft N, Papagiannaki K, Salamatian K, Nucci A, Crovella M, Diot C (2005) Traffic matrices: Balancing measurements, inference and modeling. In: Proc. of ACM SIGMETRICSCrossRef Soule A, Lakhina A, Taft N, Papagiannaki K, Salamatian K, Nucci A, Crovella M, Diot C (2005) Traffic matrices: Balancing measurements, inference and modeling. In: Proc. of ACM SIGMETRICSCrossRef
19.
go back to reference Yao H, Jaggi S, Chen M (2010) Network coding tomography for network failures. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM) Yao H, Jaggi S, Chen M (2010) Network coding tomography for network failures. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM)
20.
go back to reference Zhao Q, Ge Z, Wang J, Xu J (2006) Robust traffic matrix estimation with imperfect information: Making use of multiple data sources. In: Proc. of ACM SIGMETRICS, pp 133–144 Zhao Q, Ge Z, Wang J, Xu J (2006) Robust traffic matrix estimation with imperfect information: Making use of multiple data sources. In: Proc. of ACM SIGMETRICS, pp 133–144
Metadata
Title
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks
Authors
Zhuo Lu
Cliff Wang
Mingkui Wei
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-32699-3_5

Premium Partner