Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks

How efficiently can a malicious device disrupt communication in a wireless network? Imagine a basic game involving two honest players, Alice and Bob, who want to exchange information, and an adversary, Collin, who can disrupt communication using a limited budget of β broadcasts. How long can Collin delay Alice and Bob from communicating? In fact, the trials and tribulations of Alice and Bob capture the fundamental difficulty shared by several n-player problems, including reliable broadcast, leader election, static k-selection, and t-resilient consensus. We provide round complexity lower bounds-and (nearly) tight upper bounds- for each of those problems. These results imply bounds on adversarial efficiency, which we analyze in terms of jamming gain and disruption-free complexity.

[1]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[2]  Andrzej Lingas,et al.  The do-all problem in broadcast networks , 2001, PODC '01.

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Andrea E. F. Clementi,et al.  Optimal F-Reliable Protocols for the Do-All Problem on Single-Hop Wireless Networks , 2002, ISAAC.

[5]  Andrzej Pelc,et al.  Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..

[6]  Mika Ståhlberg Radio Jamming Attacks Against Two Popular Mobile Networks , 2000 .

[7]  Andrea E. F. Clementi,et al.  Selective families, superimposed codes, and broadcasting on unknown radio networks , 2001, SODA '01.

[8]  Andrzej Pelc,et al.  Fault-Tolerant Broadcasting in Radio Networks , 2001, J. Algorithms.

[9]  Andrzej Pelc,et al.  Feasibility and complexity of broadcasting with random transmission failures , 2005, PODC '05.

[10]  Dariusz R. Kowalski,et al.  On selection problem in radio networks , 2005, PODC '05.

[11]  F. Jiang,et al.  Exploiting the capture effect for collision detection and recovery , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..

[12]  Andrea E. F. Clementi,et al.  Round Robin is optimal for fault-tolerant broadcasting on wireless networks , 2001, J. Parallel Distributed Comput..

[13]  Roy Friedman,et al.  Efficient Byzantine broadcast in wireless ad-hoc networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[14]  Nitin H. Vaidya,et al.  Reliable broadcast in radio networks: the bounded collision case , 2006, PODC '06.

[15]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[16]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1988, CACM.

[17]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[18]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[19]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[20]  Nitin H. Vaidya,et al.  On reliable broadcast in a radio network , 2005, PODC '05.

[21]  Chiu-Yuen Koo,et al.  Broadcast in radio networks tolerating byzantine adversarial behavior , 2004, PODC '04.

[22]  Reuven Bar-Yehuda,et al.  On the Time-Complexity of Broadcast in Multi-hop Radio Networks: An Exponential Gap Between Determinism and Randomization , 1992, J. Comput. Syst. Sci..