首页> 外文期刊>Control of Network Systems, IEEE Transactions on >A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking
【24h】

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking

机译:系统理论上的纯净板岩方法可有效地保护Ad-Hoc无线网络

获取原文
获取原文并翻译 | 示例

摘要

Traditionally, wireless network protocols have been designed for performance. Subsequently, as attacks have been identified, patches have been developed. This has resulted in an “arms race” development process of discovering vulnerabilities and then patching them. The fundamental difficulty with this approach is that other vulnerabilities may still exist. No provable security or performance guarantees can ever be provided. We develop a system-theoretic approach to security that provides a complete protocol suite with provable guarantees, as well as proof of min-max optimality with respect to any given utility function of source-destination rates. Our approach is based on a model capturing the essential features of an ad-hoc wireless network that has been infiltrated with hostile nodes. We consider any collection of nodes, some good and some bad, possessing specified capabilities vis-a-vis cryptography, wireless communication, and clocks. The good nodes do not know the bad nodes. The bad nodes can collaborate perfectly, and are capable of any disruptive acts ranging from simply jamming to noncooperation with the protocols in any manner they please. The protocol suite caters to the complete life cycle, all the way from the birth of nodes, through all phases of ad-hoc network formation, leading to an optimized network carrying data reliably. It provably achieves the min-max of the utility function, where the max is over all protocol suites published and followed by the good nodes, while the min is over all Byzantine behaviors of the bad nodes. Under the protocol suite, the bad nodes do not benefit from any actions other than jamming or cooperating. This approach supersedes much of the previous work that deals with several types of attacks including wormhole, rushing, partial deafness, routing loops, routing black holes, routing gray holes, and network partition attacks.
机译:传统上,无线网络协议是为提高性能而设计的。随后,随着识别出攻击,已开发出补丁。这导致发现漏洞然后进行修补的“军备竞赛”开发过程。这种方法的基本困难在于,其他漏洞可能仍然存在。无法提供任何可证明的安全性或性能保证。我们开发了一种系统理论上的安全性方法,该方法可提供具有可证明保证的完整协议套件,并针对源-目标速率的任何给定效用函数提供最小-最大最优性的证明。我们的方法基于一个模型,该模型捕获了已被敌对节点渗透的自组织无线网络的基本功能。我们考虑了具有特定功能(相对于密码学,无线通信和时钟)的任何节点集合,无论是好是坏。好节点不知道坏节点。坏节点可以完美地协作,并且能够进行任何破坏性行为,从简单的阻塞到不以他们希望的任何方式与协议不合作。该协议套件可满足从节点诞生到ad hoc网络形成的所有阶段的整个生命周期,从而导致优化的网络可靠地承载数据。它可证明实现了效用函数的min-max,其中max超过了所有已发布的协议套件,其次是好节点,而min超过了坏节点的所有拜占庭行为。在协议套件下,不良节点除了干扰或协作外不会从任何其他操作中受益。这种方法取代了以前处理许多类型攻击的许多工作,其中包括蠕虫,冲刺,部分耳聋,路由循环,路由黑洞,路由灰洞和网络分区攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号