144,509 research outputs found

    Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks

    Get PDF
    Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar. 3-6 April 2016Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol is one of the most common standard in modern day networks and has been designed without a consideration for providing security protection at MAC layer. IEEE 802.11 assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources and disrupt network performance. This research proposes a Misbehaviour Detection MAC protocol (MD-MAC) to address the problematic scenarios of MAC layer misbehaviours, which takes a novel approach to detect misbehaviours in Mobile Adhoc Networks (MANETs). The MD-MAC modifies the CSMA/CA protocol message exchange and uses verifiable backoff value generation mechanism with an incorporated trust model which is suitable for distributed networks. The MD-MAC protocol has been implemented and evaluated in ns2, simulation results suggest that the protocol is able to detect misbehaving wireless nodes in a distributed network environment

    Development of a Security Methodology for Cooperative Information Systems: The CooPSIS Project

    Get PDF
    Since networks and computing systems are vital components of today\u27s life, it is of utmost importance to endow them with the capability to survive physical and logical faults, as well as malicious or deliberate attacks. When the information system is obtained by federating pre-existing local systems, a methodology is needed to integrate security policies and mechanisms under a uniform structure. Therefore, in building distributed information systems, a methodology for analysis, design and implementation of security requirements of data and processes is essential for obtaining mutual trust between cooperating organizations. Moreover, when the information system is built as a cooperative set of e-services, security is related to the type of data, to the sensitivity context of the cooperative processes and to the security characteristics of the communication paradigms. The CoopSIS (Cooperative Secure Information Systems) project aims to develop methods and tools for the analysis, design, implementation and evaluation of secure and survivable distributed information systems of cooperative type, in particular with experimentation in the Public Administration Domain. This paper presents the basic issues of a methodology being conceived to build a trusted cooperative environment, where data sensitivity parameters and security requirements of processes are taken into account. The milestones phases of the security development methodology in the context of this project are illustrated

    A Game Theoretical Analysis of Localization Security in Wireless Sensor Networks with Adversaries

    Get PDF
    Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node localization. In particular, we analyze the scenario in which Verifiable Multilateration (VM) is used to localize nodes and a malicious node (i.e., the adversary) try to masquerade as non-malicious. We resort to non-cooperative game theory and we model this scenario as a two-player game. We analyze the optimal players' strategy and we show that the VM is indeed a proper mechanism to reduce fake positions.Comment: International Congress on Ultra Modern Telecommunications and Control Systems 2010. (ICUMT'10

    Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Get PDF
    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.Comment: 19 pages, 7 figure

    Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

    Full text link
    Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications, such as resource sharing, cooperative communication and so on. In this paper, we propose a hybrid cooperative beamforming and jamming scheme to secure communication based on the social trust degree under a stochastic geometry framework. The friendly nodes are categorized into relays and jammers according to their locations and social trust degrees with the source node. We aim to analyze the involved connection outage probability (COP) and secrecy outage probability (SOP) of the performance in the networks. To achieve this target, we propose a double Gamma ratio (DGR) approach through Gamma approximation. Based on this, the COP and SOP are tractably obtained in closed-form. We further consider the SOP in the presence of Poisson Point Process (PPP) distributed eavesdroppers and derive an upper bound. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the security performance in the networks.Comment: 30 pages, 11 figures, to be published in IEEE Transactions on Communication

    Signal processing for distributed nodes in smart networks

    No full text
    With increasing environmental concern for energy conservation and mitigating climate change, next generation smart networks are bound to provide improved performance in terms of security, reliability, and energy efficiency. For instance, future smart networks will work in highly complex and dynamic environments and will have distributed nodes that need to interact with each other and may also interact with an energy provider in order to improve their performance. In this context, advanced signal processing tools such as game theory and distributed transmit beamforming can yield tremendous performance gains in terms of energy efficiency for demand management and signal trans-mission in smart networks. The central theme of this dissertation is the modeling of energy usage behavior of self-seeking distributed nodes in smart networks. The thesis mainly looks into two key areas of smart networks: 1) smart grid networks and 2) wireless sensor networks, and contains: an analytical framework of the economics of electric vehicle charging in smart grids in an energy constrained environment; a study of a consumer-centric energy management scheme for encouraging the consumers in a smart grid to voluntarily take part in energy management; an outage management scheme for efficiently curtailing energy from the consumers in smart grids in the event of a power outage; a comprehensive study of power control of sensors in a wireless sensor network using game theory and distributed transmit beamforming; and finally, an energy aware distributed transmit beamfoming technique for long distance signal transmission in a wireless sensor network. This thesis addresses the challenges of modeling the energy usage behavior of distributed nodes through studying the propriety of energy users in smart networks, 1) by capturing the interactions between the energy users and energy provider in smart grids using non-cooperative Stackelberg and generalized Nash games, and showing that the socially optimal energy management for users can be achieved at the solution of the games, and 2) by studying the power control of sensors in wireless sensor networks, using a non-cooperative Nash game and distributed transmit beamforming that demonstrates significant transmit energy savings for the sensors. To foster energy efficient transmission, the thesis also studies a distributed transmit beamforming technique that does not require any channel state information for long distance signal transmission in sensor networks. The contributions of this dissertation are enhanced by proposing suitable system models and appropriate signal processing techniques. These models and techniques can capture the different cost-benefit tradeoffs that exist in these networks. All the proposed schemes in this dissertation are shown to have significant performance improvement when compared with existing solutions. The work in this thesis demonstrates that modeling power usage behavior of distributed nodes in smart networks is both possible and beneficial for increasing the energy efficiency of these networks
    • ā€¦
    corecore