Skip to main content

A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks

  • Chapter
  • First Online:

Abstract

In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles of nodes are non-homogeneous; i.e., they are not equally important. This, however, opens a door for an adversary to target important nodes in the network by identifying their roles. In this chapter, we focus on investigating an important open question: how to detect and conceal the roles of nodes in wireless networks? Answers to this question are of essential importance to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis and simulations that it is feasible and even accurate to identify critical roles of nodes by looking at network traffic patterns. To provide countermeasures against role detection, we propose role concealment methods based on proactive and deceptive network strategies. We use simulations to evaluate the effectiveness and costs of the role concealment methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    For the sake of notation simplicity, we consider undirected links in this chapter. We note that the directed link case does not affect any formulation in this chapter and thus is a straightforward extension.

References

  1. Bar-Noy A, Cirincione G, Govindan R, Krishnamurthy S, LaPorta T, Mohapatra P, Neely M, Yener A (2011) Quality-of-information aware networking for tactical military networks. In: Proc. of IEEE IEEE International Conference on Pervasive Computing and Communications (PERCOM) Workshops, pp 2–7

    Google Scholar 

  2. Bu T, Duffield N, Presti FL, Towsley D (2002) Network tomography on general topologies. In: Proc. of ACM SIGMETRICS

    Book  Google Scholar 

  3. Candes E, Romberg J, Tao T (2005) Stable signal recovery from incomplete and inaccurate information. Communications on Pure and Applied Mathematics pp 1207–1233

    Google Scholar 

  4. Candes E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Information Theory 52:489–509

    Article  MathSciNet  MATH  Google Scholar 

  5. Castro R, Coates M, Liang G, Nowak R, Yu B (2004) Network tomography: Recent developments. Statistical Science 19:499–517

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen A, Cao J, Bu T (2010) Network tomography: Identifiability and fourier domain estimation. IEEE Trans Signal Processing 58:6029–6039

    Article  MathSciNet  Google Scholar 

  7. Elmasry GF (2010) A comparative review of commercial vs. tactical wireless networks. IEEE Communications Magazine 48(10):54–59

    Article  Google Scholar 

  8. Elmasry GF, McCann CJ, Welsh R (2005) Partitioning QoS management for secure tactical wireless ad hoc networks. IEEE Communications Magazine 43(11):116–123

    Article  Google Scholar 

  9. Friedlander MP, Saunders MA (2008) Active-set methods for basis pursuit. In: Proc. of West Coast Optimization Meeting (WCOM)

    Google Scholar 

  10. Horton JD, Lopez-Ortiz A (2003) On the number of distributed measurement points for network tomography. In: Proc. of ACM SIGCOMM Internet Measurement Conference (IMC), pp 204–209

    Google Scholar 

  11. Kidston D, Shi M (2012) A multicast routing technique for tactical networks. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–6

    Google Scholar 

  12. Kunz T, Li L (2010) Broadcasting in multihop mobile tactical networks: To network code or not. In: Proc. of The International Wireless Communications and Mobile Computing Conference (IWCMC), pp 676–680

    Google Scholar 

  13. Kunz T, Li L (2014) Robust broadcasting in tactical networks using network coding. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1213–1222

    Google Scholar 

  14. Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–7

    Google Scholar 

  15. Lu Z, Wang C (Apr. 2015) Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM)

    Google Scholar 

  16. Lu Z, Wang C, Wei M (Oct. 2015) On detection and concealment of critical roles in tactical wireless networks. In: Proc. of IEEE Conference on Military Communications (MILCOM)

    Google Scholar 

  17. Penrose M (2003) Random Geometric Graphs. Oxford Univ. Press

    Book  MATH  Google Scholar 

  18. Soule A, Lakhina A, Taft N, Papagiannaki K, Salamatian K, Nucci A, Crovella M, Diot C (2005) Traffic matrices: Balancing measurements, inference and modeling. In: Proc. of ACM SIGMETRICS

    Book  Google Scholar 

  19. Yao H, Jaggi S, Chen M (2010) Network coding tomography for network failures. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM)

    Google Scholar 

  20. Zhao Q, Ge Z, Wang J, Xu J (2006) Robust traffic matrix estimation with imperfect information: Making use of multiple data sources. In: Proc. of ACM SIGMETRICS, pp 133–144

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuo Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lu, Z., Wang, C., Wei, M. (2016). A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. In: Jajodia, S., Subrahmanian, V., Swarup, V., Wang, C. (eds) Cyber Deception. Springer, Cham. https://doi.org/10.1007/978-3-319-32699-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32699-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32697-9

  • Online ISBN: 978-3-319-32699-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics