Skip to main content

Cyber Maneuver Against External Adversaries and Compromised Nodes

  • Conference paper
  • First Online:
Moving Target Defense II

Part of the book series: Advances in Information Security ((ADIS,volume 100))

Abstract

This article identifies the research issues and challenges from jamming and other attacks by external sources and insiders. Based on the spirit of cyber maneuver, it proposes a general framework to deal with such issues. Central to our framework is the notion of maneuver keys as spread-spectrum keys; they supplement the higher-level network cryptographic keys and provide the means to resist and respond to external and insider attacks. The framework also includes components for attack detection, identification of compromised nodes, and group rekeying that excludes compromised nodes. At this stage, much research is still needed on the design of each component as well as integrating these components seamlessly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, Springer Advances in Information Security Series, vol. 54, 2011.

    Google Scholar 

  2. P. Beraud, A. Cruz, S. Hassell, and S. Meadows, “Using cyber maneuver to improve network resiliency,” Proc. IEEE Military Commun.Conf. (MILCOM). The work of Sushil Jajodia was performed while he was a Visiting Researcher at the US Army Research Laboratory, 2011.

    Google Scholar 

  3. J. V. Merwe, D. Dawoud, and S. McDonald, “A survey on peer-to-peer key management for mobile ad hoc networks,” ACM Computing Surveys, vol. 39, pp. 1–45, 2007.

    Google Scholar 

  4. M. Nogueira, E. D. Silva, A. Santos, and L. C. P. Albini, “Survivable key management on WANETs,” IEEE Wireless Commun., pp. 82–88, Dec. 2011.

    Google Scholar 

  5. D. Torrieri, Principles of Spread-Spectrum Communication Systems, 2nd ed., Springer, 2011.

    Google Scholar 

  6. D. J. Torrieri, “Fundamental limitations on repeater jamming of frequency-hopping communications”, IEEE J. Select. Areas Commun., vol. 7, pp. 569–575, May 1989.

    Google Scholar 

  7. K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, “Denial of service Attacks in wireless networks: the case of jammers,” IEEE Commun. Surveys Tuts, vol. 13, 2nd quarter, pp. 245–257, 2011.

    Google Scholar 

  8. Y.-S. Shiu, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Commun., pp. 66–74, April 2011.

    Google Scholar 

  9. L. Lazos and M. Krunz, “Selective jamming/dropping insider attacks in wireless mesh networks,” IEEE Network, Jan./Feb. 2011.

    Google Scholar 

  10. A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming and countermeasures in WSNs,” IEEE Commun. Surveys Tuts., vol. 11, pp. 42–56, 4th quarter, 2009.

    Google Scholar 

  11. W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attacks and defense strategies,” IEEE Network, May/June 2006.

    Google Scholar 

  12. C. Popper, M. Strasser, S. Capkun, “Anti-jamming broadcast communication using uncoordinated spread spectrum,” IEEE J. Sel. Areas Commun., vol. 28, pp. 703–715, June 2010.

    Google Scholar 

  13. J. T. Chiang and Y.-C. Hu, “Cross-layer jamming detection and mitigation in wireless broadcast networks,” IEEE/ACM Trans. Networking, vol. 19, pp. 286–298, Feb. 2011.

    Google Scholar 

  14. Y. Desmedt, et al., “Broadcast anti-jamming systems,” Elsevier Computer Networks, 2001.

    Google Scholar 

  15. X. Jiang, W. Hu, S. Zhu, and G. Cao, “Compromise-resilient anti-jamming for wireless sensor networks,” Proc. Twelfth Intern. Conf. Inform. and Commun. Security (ICICS), 2010.

    Google Scholar 

  16. M. Çakiroǧlu, A. T. Özcerit, “Jamming detection mechanisms for wireless sensor networks,” Proc. Third Intern. Conf. Scalable Inform. Systems, pp. 4:1–4:8, 2008.

    Google Scholar 

  17. M. Li, I. Koutsopoulos, R. Poovendran, “Optimal jamming attacks and network defense policies in wireless sensor networks,” Proc. 26th IEEE Intern. Conf. Computer Commun., pp. 1307–1315, 2007.

    Google Scholar 

  18. S. Misra, R. Singh, S. V. R. Mohan, “Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system,” Sensors, vol. 10, pp. 3444–3479, 2010.

    Google Scholar 

  19. K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S. V. Krishnamurthy, “Lightweight jammer localization in wireless networks: system design and implementation,” Proc. Globecom Conf., 2009.

    Google Scholar 

  20. D. Torrieri and K. Bakhru, “Direction finding for spread-spectrum systems with adaptive arrays,” Proc. IEEE Military Commun. Conf., 2006.

    Google Scholar 

  21. H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt, “A novel approach to identify insider-based jamming attacks in multi-channel wireless networks,” Proc. IEEE Military Commun.Conf. (MILCOM), 2009.

    Google Scholar 

  22. S. Reidt, M. Srivatsa, and S. Balfe, “The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks,” Proc. ACM Conf. Computer and Commun. Security (CCS), 2009.

    Google Scholar 

Download references

Acknowledgements

The work of Sencun Zhu was funded by the US Army Research Laboratory under cooperative agreement number W911NF1120086.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Don Torrieri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Torrieri, D., Zhu, S., Jajodia, S. (2013). Cyber Maneuver Against External Adversaries and Compromised Nodes. In: Jajodia, S., Ghosh, A., Subrahmanian, V., Swarup, V., Wang, C., Wang, X. (eds) Moving Target Defense II. Advances in Information Security, vol 100. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5416-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5416-8_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5415-1

  • Online ISBN: 978-1-4614-5416-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics