• DocumentCode
    980496
  • Title

    Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis

  • Author

    Tague, Patrick ; Slater, David ; Rogers, Jason ; Poovendran, Radha

  • Author_Institution
    Dept. of Electr. Eng., Univ. of Washington, Seattle, WA
  • Volume
    6
  • Issue
    2
  • fYear
    2009
  • Firstpage
    111
  • Lastpage
    123
  • Abstract
    Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the vulnerability metric as a nonlinear integer programming minimization problem and propose the GNAVE algorithm, a Greedy Node capture Approximation using Vulnerability Evaluation. We discuss the availability of security parameters to the adversary and show that unknown parameters can be estimated using probabilistic analysis. We demonstrate vulnerability evaluation using the proposed metrics and node capture attacks using the GNAVE algorithm through detailed examples and simulation.
  • Keywords
    approximation theory; greedy algorithms; integer programming; minimisation; nonlinear programming; probability; radio networks; routing protocols; set theory; telecommunication security; telecommunication traffic; GNAVE algorithm; circuit theory; greedy node capture approximation; joint security analysis; node capture attack; nonlinear integer programming minimization problem; probabilistic analysis; routing protocol; set theory; wireless network traffic vulnerability evaluation; Communication/Networking and Information Technology; Computer Systems; Network Architecture and Design; Network Operations; Network Protocols; Network management; Network-level security and protection; Routing protocols; Wireless communication; Wireless networks; adversary models.; node capture attacks; routing; security;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2008.60
  • Filename
    4668352