Abstract
This article identifies the research issues and challenges from jamming and other attacks by external sources and insiders. Based on the spirit of cyber maneuver, it proposes a general framework to deal with such issues. Central to our framework is the notion of maneuver keys as spread-spectrum keys; they supplement the higher-level network cryptographic keys and provide the means to resist and respond to external and insider attacks. The framework also includes components for attack detection, identification of compromised nodes, and group rekeying that excludes compromised nodes. At this stage, much research is still needed on the design of each component as well as integrating these components seamlessly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats, Springer Advances in Information Security Series, vol. 54, 2011.
P. Beraud, A. Cruz, S. Hassell, and S. Meadows, “Using cyber maneuver to improve network resiliency,” Proc. IEEE Military Commun.Conf. (MILCOM). The work of Sushil Jajodia was performed while he was a Visiting Researcher at the US Army Research Laboratory, 2011.
J. V. Merwe, D. Dawoud, and S. McDonald, “A survey on peer-to-peer key management for mobile ad hoc networks,” ACM Computing Surveys, vol. 39, pp. 1–45, 2007.
M. Nogueira, E. D. Silva, A. Santos, and L. C. P. Albini, “Survivable key management on WANETs,” IEEE Wireless Commun., pp. 82–88, Dec. 2011.
D. Torrieri, Principles of Spread-Spectrum Communication Systems, 2nd ed., Springer, 2011.
D. J. Torrieri, “Fundamental limitations on repeater jamming of frequency-hopping communications”, IEEE J. Select. Areas Commun., vol. 7, pp. 569–575, May 1989.
K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, “Denial of service Attacks in wireless networks: the case of jammers,” IEEE Commun. Surveys Tuts, vol. 13, 2nd quarter, pp. 245–257, 2011.
Y.-S. Shiu, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Commun., pp. 66–74, April 2011.
L. Lazos and M. Krunz, “Selective jamming/dropping insider attacks in wireless mesh networks,” IEEE Network, Jan./Feb. 2011.
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming and countermeasures in WSNs,” IEEE Commun. Surveys Tuts., vol. 11, pp. 42–56, 4th quarter, 2009.
W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attacks and defense strategies,” IEEE Network, May/June 2006.
C. Popper, M. Strasser, S. Capkun, “Anti-jamming broadcast communication using uncoordinated spread spectrum,” IEEE J. Sel. Areas Commun., vol. 28, pp. 703–715, June 2010.
J. T. Chiang and Y.-C. Hu, “Cross-layer jamming detection and mitigation in wireless broadcast networks,” IEEE/ACM Trans. Networking, vol. 19, pp. 286–298, Feb. 2011.
Y. Desmedt, et al., “Broadcast anti-jamming systems,” Elsevier Computer Networks, 2001.
X. Jiang, W. Hu, S. Zhu, and G. Cao, “Compromise-resilient anti-jamming for wireless sensor networks,” Proc. Twelfth Intern. Conf. Inform. and Commun. Security (ICICS), 2010.
M. Çakiroǧlu, A. T. Özcerit, “Jamming detection mechanisms for wireless sensor networks,” Proc. Third Intern. Conf. Scalable Inform. Systems, pp. 4:1–4:8, 2008.
M. Li, I. Koutsopoulos, R. Poovendran, “Optimal jamming attacks and network defense policies in wireless sensor networks,” Proc. 26th IEEE Intern. Conf. Computer Commun., pp. 1307–1315, 2007.
S. Misra, R. Singh, S. V. R. Mohan, “Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system,” Sensors, vol. 10, pp. 3444–3479, 2010.
K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S. V. Krishnamurthy, “Lightweight jammer localization in wireless networks: system design and implementation,” Proc. Globecom Conf., 2009.
D. Torrieri and K. Bakhru, “Direction finding for spread-spectrum systems with adaptive arrays,” Proc. IEEE Military Commun. Conf., 2006.
H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt, “A novel approach to identify insider-based jamming attacks in multi-channel wireless networks,” Proc. IEEE Military Commun.Conf. (MILCOM), 2009.
S. Reidt, M. Srivatsa, and S. Balfe, “The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks,” Proc. ACM Conf. Computer and Commun. Security (CCS), 2009.
Acknowledgements
The work of Sencun Zhu was funded by the US Army Research Laboratory under cooperative agreement number W911NF1120086.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Torrieri, D., Zhu, S., Jajodia, S. (2013). Cyber Maneuver Against External Adversaries and Compromised Nodes. In: Jajodia, S., Ghosh, A., Subrahmanian, V., Swarup, V., Wang, C., Wang, X. (eds) Moving Target Defense II. Advances in Information Security, vol 100. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5416-8_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5416-8_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5415-1
Online ISBN: 978-1-4614-5416-8
eBook Packages: Computer ScienceComputer Science (R0)