首页> 外文会议>International Conference on the Design of Reliable Communication Networks >Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed Networks
【24h】

Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed Networks

机译:非鉴定网络中多流氓退避操控攻击的正式建模与分析

获取原文

摘要

Security vulnerabilities that are unique to unlicensed (secondary) networks have been well studied in literature. However, the nature and impact of traditional wireless network threats, such as backoff manipulation when applied to secondary networks, require further investigation in particular for multiple rogue station scenarios. In this paper, we perform modeling and analysis of multi-rogue backoff manipulation attack strategies in secondary wireless networks using the PRISM probabilistic model checker. Our secondary network implementation in PRISM includes scenarios where: a) sub-band (channel) occupancy by licensed (primary) nodes follows an ON-OFF model with parameters derived from real measurement data and b) the secondary network consists of up to three rogue secondary stations out of eight total with all following CSMA/CA like contention process for channel access. Unlike honest secondary stations, the rogues carry out a backoff-manipulation strategy of selecting a backoff timer that deviates from the backoff-selection process mandated by the secondary network. Unlike simulation based analysis, our analysis using PRISM model checker considers all possible combinations of system parameters and proves that for any set of primary ONOFF parameters and for any density of rogues in the network, a fixed backoff selection (instead of random) maximizes the channel access probability of a particular rogue irrespective of other rogues' selection strategy. The results from this work will help generate deeper understanding of medium access threat landscape of secondary networks and foster design of more resilient access control strategies.
机译:对未经许可(二级)网络独有的安全漏洞在文献中得到了很好的研究。然而,传统无线网络威胁的性质和影响,例如在应用于二级网络时退出操作,特别需要进一步调查多个流氓站场景。在本文中,我们使用棱镜概率模型检查器对次级无线网络中的多流氓退避操纵攻击策略进行建模和分析。棱镜中的二级网络实现包括:a)通过许可(主要)节点的子带(通道)占用遵循与从真实测量数据导出的参数的开关模型,b)二次网络由最多三个流氓组成辅助站中的八个总量与所有以下CSMA / CA相同的CSMA / CA,如渠道访问​​。与诚实的二级站不同,盗贼执行选择退避计时器的退避操纵策略,该策略偏离辅助网络强制要求的退避选择过程。与仿真的分析不同,我们使用棱镜模型检查器的分析考虑了系统参数的所有可能组合,并证明了对于任何一组主要的初级诺福音参数以及网络中的任何密度,固定的退避选择(而不是随机)最大化了通道特定流氓的访问概率,无论其他流氓的选择策略如何。这项工作的结果将有助于更深入地了解中型网络的媒体访问威胁景观,并促进更具弹性访问控制策略的促进设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号