DocumentCode :
1257979
Title :
Surviving Attacks in Challenged Networks
Author :
Cucurull, Jordi ; Asplund, Mikael ; Nadjm-Tehrani, Simin ; Santoro, Tiziano
Author_Institution :
Dept. of Comput. Sci., Univ. of Linkoping, Linkoping, Sweden
Volume :
9
Issue :
6
fYear :
2012
Firstpage :
917
Lastpage :
929
Abstract :
In the event of a disaster, telecommunication infrastructures can be severely damaged or overloaded. Hastily formed networks can provide communication services in an ad hoc manner. These networks are challenging due to the chaotic context where intermittent connection is the norm and the identity and number of participants cannot be assumed. In such environments malicious actors may try to disrupt the communications to create more chaos for their own benefit. This paper proposes a general security framework for monitoring and reacting to disruptive attacks. It includes a collection of functions to detect anomalies, diagnose them, and perform mitigation. The measures are deployed in each node in a fully distributed fashion, but their collective impact is a significant resilience to attacks, so that the actors can disseminate information under adverse conditions. The approach has been evaluated in the context of a simulated disaster area network with a manycast dissemination protocol, Random Walk Gossip, with a store-and-forward mechanism. A challenging threat model where adversaries may attempt to reduce message dissemination or drain network resources without spending much of their own energy has been adopted.
Keywords :
disasters; mobile ad hoc networks; protocols; telecommunication security; anomaly detection; challenged network; chaotic context; communication service; disaster; disruptive attack monitoring; disruptive attack reaction; drain network resource; environments malicious actor; hastily formed network; information dissemination; intermittent connection; intermittently connected mobile ad hoc network; manycast dissemination protocol; message dissemination; random walk gossip; security framework; store-and-forward mechanism; telecommunication infrastructure; Detectors; Mobile ad hoc networks; Monitoring; Network security; Delay-tolerant networks; intrusion tolerance; manycast; survivability;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2012.67
Filename :
6259800
Link To Document :
بازگشت