4 research outputs found

    Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR

    Get PDF
    In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhole attacks on Intrusion Detection Systems. More specifically, we propose a mathematical framework for obtaining performance bounds of Byzantine attackers and the Intrusion Detection System (IDS) in terms of detection delay. We formulate the problem of distributed collaborative defense against coordinated attacks in MANET as a dynamic game problem. In our formulation we have on the one hand a group of attackers that observe what is going on in the network and coordinate their attack in an adaptive manner. On the other side, we have a group of defending nodes (the IDS nodes) that collaboratively observe the network and coordinate their actions against the attackers. Using extensions of the game theoretic framework of [3] we provide a mathematical framework for efficient identification of the worst attacks and damages that the attackers can achieve, as well as the best response of the defenders. This approach leads to quantifying resiliency of the routing-attack IDS with respect to Byzantine attacks

    Transport protocols revisited

    No full text
    This paper evaluates and compares the performance of various transport protocols over some current tactical radios using different topologies. The four selected transport protocols were TCP, SCTP, UDT, and Mockets. The comparison was done with three different tactically relevant radios - the Harris PRC-117G, the TrellisWare TW-400, and the Persistent Systems WaveRelay MPU4. The results show a surprising amount of variability in performance, and indicate that the Mockets transport protocol provided the best overall performance on two of the three radios used for evaluation

    Analyzing the applicability of Internet of Things to the battlefield environment

    No full text
    As the Internet of Things (IoT) matures in commercial sectors, the promise of diverse new technologies such as data-driven applications, intelligent adaptive systems, and embedded optimized automation will be realized in every environment. An immediate research question is whether contemporary IoT concepts can be applied also to military battlefield environments and can realize benefits similar to those in industry. Military environments, especially those that depend on tactical communications, are much more challenging than commercial environments. Thus it is likely many commercial IoT architectures and technologies may not translate into the military domain and others will require additional research to enable deployment and efficient implementation. This paper investigates these issues and describes potential military operational activities that could benefit from commercial IoT technologies, including logistics, sensing/surveillance, and situation awareness. In addition, the paper lays out a roadmap for future research necessary to leverage IoT and apply it to the tactical battlefield environment
    corecore