Skip to main content
Top

2015 | Book

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

insite
SEARCH

About this book

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Table of Contents

Frontmatter
Chapter 1. Modeling and Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks
Abstract
With the advancement with flexible and configurable wireless adapters, it becomes feasible for a node to modify its low-layer (e.g. physical or MAC layer) parameters, which can substantially affect the network performance of a wireless network. Backoff misbehavior, in which a node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-service. Although great progress has been made towards the design of countermeasures to backoff misbehavior, little attention has been focused on quantifying the gain of backoff misbehaviors. In this chapter, to assess the gain that misbehaving nodes can obtain, we introduce a new metric, namely order gain, to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes in CSMA/CA-based wireless networks. We derive the order gains of a variety of misbehaviors and further investigate the relation between our metric, order gain, and the throughput gain for a misbehaving node. We show that in IEEE 802.11 networks, the throughput ratio of a backoff misbehaving node to a legitimate node is either bounded above or proportional to the number of legitimate nodes. We use both simulations and experiments to validate our theoretical analysis and to further demonstrate the impact of a wide range of backoff misbehaviors on network performance in CSMA/CA-based wireless networks.
Zhuo Lu, Wenye Wang, Cliff Wang
Chapter 2. Modeling the Impact of Jamming Attacks on Time-Critical Traffic with Applications to Smart Grid
Abstract
In this chapter, we aim at modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics, such as packet loss and throughput are used to measure the network performance, we introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. Our modeling approach is inspired by the similarity between the behavior of a jammer who attempts to disrupt the delivery of a time-critical message and the behavior of a gambler who tends to win a gambling game. Therefore, by gambling-based modeling and real-time experiments, we find that there exist a phase transition phenomenon for successful time-critical message delivery under a variety of jamming attacks. That is, as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly, then increases dramatically to 1. Based on analytical and experimental results, we design the jamming attack detection based on estimation (JADE) scheme to achieve efficient and robust jamming detection, and implement the JADE system in a wireless network for power substations in the smart grid.
Zhuo Lu, Wenye Wang, Cliff Wang
Chapter 3. Minimizing Message Delay of Time-Critical Traffic for Wireless Smart Grid Applications Under Jamming
Abstract
In the previous chapter, we offered a comprehensive study on modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. However, only modeling and detection cannot provide defense against jamming attacks, and is only the first setup towards anti-jamming communication for wireless smart grid applications. Hence, spread spectrum systems, which provide jamming resilience via multiple frequency and code channels, must be adapted to the smart grid for secure wireless communications, while at the same time providing latency guarantee for control messages. An open question is how to minimize message delay for timely smart grid communication under any potential jamming attack.To address this issue, we provide a paradigm shift from the case-by-case methodology, which is widely used in existing works to investigate well-adopted attack models (also used in the previous chapter), to the worst-case methodology, which offers delay performance guarantee for smart grid applications under any attack. We first define a generic jamming process that characterizes a wide range of existing attack models. Then, we show that in all strategies under the generic process, the worst-case message delay is a U-shaped function of network traffic load. This indicates that, interestingly, increasing a fair amount of traffic can in fact improve the worst-case delay performance. As a result, we demonstrate a lightweight yet promising system, TACT (transmitting adaptive camouflage traffic), to combat jamming attacks. TACT minimizes the message delay by generating extra traffic called camouflage to balance the network load at the optimum. Experiments show that TACT can decrease the probability that a message is not delivered on time in order of magnitude for smart grid applications.
Zhuo Lu, Wenye Wang, Cliff Wang
Chapter 4. Understanding the Resilience of Mobile Cloud Services to Malware
Abstract
In this chapter, we aim to measure the resilience of mobile cloud services to malware. Since the cloud is intended to provide real-time services to mobile users, we introduce a new metric, resilience factor, to denote the maximally allowable percentage of malware-infected nodes in the network such that a required ratio of cloud service requests can still be processed on time. We find that for mobile cloud services, there exists a cutoff point on network bandwidth B, below which the resilience factor is an increasing function of B, and beyond which the resilience factor decreases on the order of 1∕B. Such a dichotomy demonstrates another perspective on developing network infrastructures for mobile cloud computing: although low bandwidth in current cellular networks is viewed as a primary drawback to support mobile cloud services, increasing bandwidth can, on the other hand, jeopardize malware resilience. In addition, we show via experiments that in malware epidemics, if B is less than the cutoff point, service quality is deteriorated mainly by network congestion (especially at mobility hotspots), thereby leading to heterogeneous malware resilience across the network; if B is larger than the cutoff point, malware-induced cloud overload becomes the performance bottleneck that can result in global service degradation. Our results encourage deployment of countermeasures in both the network and cloud to effectively defend against malware attacks.
Zhuo Lu, Wenye Wang, Cliff Wang
Metadata
Title
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Authors
Zhou Lu
Wenye Wang
Cliff Wang
Copyright Year
2015
Electronic ISBN
978-3-319-23288-1
Print ISBN
978-3-319-23287-4
DOI
https://doi.org/10.1007/978-3-319-23288-1

Premium Partner