4.5 Article

Modeling adaptive node capture attacks in multi-hop wireless networks

Journal

AD HOC NETWORKS
Volume 5, Issue 6, Pages 801-814

Publisher

ELSEVIER
DOI: 10.1016/j.adhoc.2007.01.002

Keywords

Adversary modeling; Integer programming; Key establishment; Node capture attacks

Funding

  1. ONR YIP [N00014-04-1-0479]
  2. ARO PE-CASE [W911NF-05-1-0491]
  3. NSA/DoD IASP Fellowship
  4. ARL Collaborative Technology Alliance (CTA) grant [DAAD19-01-2-0011]

Ask authors/readers for more resources

We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev-Yao model are known to be unsuitable for describing node capture attacks. By defining the amortized initialization overhead cost as well as the cost of capturing a node, we show that finding the node capture attack yielding the minimum cost can be formulated as an integer-programming minimization problem. Hence, there is no polynomial solution to find the minimum cost node capture attack. We show that depending on the adversary's knowledge of the constraint matrix in the integer-programming problem, different greedy heuristics can be developed for node capture attacks. We also show under what conditions privacy-preserving key establishment protocols can help to prevent minimum cost node capture attacks. Individual node storage randomization is investigated as a technique to mitigate the effect of attacks which are not prevented by the use of privacy-preserving protocols. It is shown that probabilistic heuristic attacks can be performed effectively even under storage randomization. (c) 2007 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available