首页> 外文期刊>Ad hoc networks >A probabilistic framework for jammer identification in MANETs
【24h】

A probabilistic framework for jammer identification in MANETs

机译:MANET中干扰识别的概率框架

获取原文
获取原文并翻译 | 示例
           

摘要

Cyber maneuver is envisioned as a way of increasing the robustness of imperfect systems by creating and deploying mechanisms that continually change a system's attack surface. A particularly useful strategy against jamming attacks in Mobile Ad Hoc Networks (MANETs) entails using cyber-maneuver keys to supplement higher-level cryptographic keys. Such keys can be periodically changed either in a proactive fashion - to defeat cryptanalytic efforts by external attackers - or in a reactive fashion - to exclude compromised internal nodes. In order to enable effective reactive rekeying, it is critical to correctly identify compromised nodes. In this paper, we propose a probabilistic framework for identifying jammers, based on the location of both jammed and non-jammed nodes. We are interested in finding the smallest set of nodes that need to be excluded to stop the attacks in a multi-jammer scenario. We show that this problem is NP-hard, and propose a polynomial-time heuristic algorithm to find approximate solutions. Experiments show that our approach works well in practice, and that the algorithm is efficient and achieves good precision and recall.
机译:通过创建和部署可不断更改系统攻击面的机制,可以将网络操纵设想为提高不完善系统的鲁棒性的一种方式。针对移动自组织网络(MANET)中的干扰攻击的一种特别有用的策略是使用网络操纵密钥来补充高级密码密钥。可以以主动方式(以击败外部攻击者的密码分析方法)或以被动方式(以排除受损的内部节点)定期更改此类密钥。为了实现有效的反应式密钥更新,正确识别受损节点至关重要。在本文中,我们基于拥塞节点和非拥塞节点的位置,提出了一种识别干扰器的概率框架。我们感兴趣的是找到在多干扰情形下需要排除的最小节点集,以阻止攻击。我们证明了这个问题是NP难的,并提出了多项式时间启发式算法来寻找近似解。实验表明,该方法在实践中效果很好,算法高效,精度和召回率高。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号