Abstract
In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles of nodes are non-homogeneous; i.e., they are not equally important. This, however, opens a door for an adversary to target important nodes in the network by identifying their roles. In this chapter, we focus on investigating an important open question: how to detect and conceal the roles of nodes in wireless networks? Answers to this question are of essential importance to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis and simulations that it is feasible and even accurate to identify critical roles of nodes by looking at network traffic patterns. To provide countermeasures against role detection, we propose role concealment methods based on proactive and deceptive network strategies. We use simulations to evaluate the effectiveness and costs of the role concealment methods.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
For the sake of notation simplicity, we consider undirected links in this chapter. We note that the directed link case does not affect any formulation in this chapter and thus is a straightforward extension.
References
Bar-Noy A, Cirincione G, Govindan R, Krishnamurthy S, LaPorta T, Mohapatra P, Neely M, Yener A (2011) Quality-of-information aware networking for tactical military networks. In: Proc. of IEEE IEEE International Conference on Pervasive Computing and Communications (PERCOM) Workshops, pp 2–7
Bu T, Duffield N, Presti FL, Towsley D (2002) Network tomography on general topologies. In: Proc. of ACM SIGMETRICS
Candes E, Romberg J, Tao T (2005) Stable signal recovery from incomplete and inaccurate information. Communications on Pure and Applied Mathematics pp 1207–1233
Candes E, Romberg J, Tao T (2006) Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans Information Theory 52:489–509
Castro R, Coates M, Liang G, Nowak R, Yu B (2004) Network tomography: Recent developments. Statistical Science 19:499–517
Chen A, Cao J, Bu T (2010) Network tomography: Identifiability and fourier domain estimation. IEEE Trans Signal Processing 58:6029–6039
Elmasry GF (2010) A comparative review of commercial vs. tactical wireless networks. IEEE Communications Magazine 48(10):54–59
Elmasry GF, McCann CJ, Welsh R (2005) Partitioning QoS management for secure tactical wireless ad hoc networks. IEEE Communications Magazine 43(11):116–123
Friedlander MP, Saunders MA (2008) Active-set methods for basis pursuit. In: Proc. of West Coast Optimization Meeting (WCOM)
Horton JD, Lopez-Ortiz A (2003) On the number of distributed measurement points for network tomography. In: Proc. of ACM SIGCOMM Internet Measurement Conference (IMC), pp 204–209
Kidston D, Shi M (2012) A multicast routing technique for tactical networks. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–6
Kunz T, Li L (2010) Broadcasting in multihop mobile tactical networks: To network code or not. In: Proc. of The International Wireless Communications and Mobile Computing Conference (IWCMC), pp 676–680
Kunz T, Li L (2014) Robust broadcasting in tactical networks using network coding. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1213–1222
Lee SH, Lee S, Song H, Lee HS (2009) Wireless sensor network design for tactical military applications: remote large-scale environments. In: Proc. of IEEE Conference on Military Communications (MILCOM), pp 1–7
Lu Z, Wang C (Apr. 2015) Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM)
Lu Z, Wang C, Wei M (Oct. 2015) On detection and concealment of critical roles in tactical wireless networks. In: Proc. of IEEE Conference on Military Communications (MILCOM)
Penrose M (2003) Random Geometric Graphs. Oxford Univ. Press
Soule A, Lakhina A, Taft N, Papagiannaki K, Salamatian K, Nucci A, Crovella M, Diot C (2005) Traffic matrices: Balancing measurements, inference and modeling. In: Proc. of ACM SIGMETRICS
Yao H, Jaggi S, Chen M (2010) Network coding tomography for network failures. In: Proc. of IEEE International Conference on Computer Communications (INFOCOM)
Zhao Q, Ge Z, Wang J, Xu J (2006) Robust traffic matrix estimation with imperfect information: Making use of multiple data sources. In: Proc. of ACM SIGMETRICS, pp 133–144
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lu, Z., Wang, C., Wei, M. (2016). A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. In: Jajodia, S., Subrahmanian, V., Swarup, V., Wang, C. (eds) Cyber Deception. Springer, Cham. https://doi.org/10.1007/978-3-319-32699-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-32699-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32697-9
Online ISBN: 978-3-319-32699-3
eBook Packages: Computer ScienceComputer Science (R0)