Robust Network Architecture Against Random Threats in WMD Environments: Theoretical Limits and Recovery Strategies

Abstract : This project presents a comprehensive summary of the problems under study, our approaches, technical contributions, and accomplishments that are supported throughout the entire project period, April 15, 2008 to July 31, 2014. There are two time periods for this project, one is the original award from September 1 2008 to August 31, 2011, and the other from September 1, 2011 to July 31, 2014 as the supplemental period. In the original project, we addressed two thrusts, namely network vulnerabilities and recovery strategies in the aftermath of WMD attacks. More specifically, this research targets a set of fundamental issues to understand network response following an attack by WMD/WME: how to model a network topology in the presence of attacks/failures from random threats; how to estimate or predict network survivability to sustain critical applications; how to de-sign/form network architecture to approach the theoretical limits of network robustness; and how to inter-operate with other available/limited sources for fast communication recovery.

[1]  Christian Bettstetter,et al.  On the Connectivity of Ad Hoc Networks , 2004, Comput. J..

[2]  Hossein Hooshyar System Protection for High PV-Penetrated Residential Distribution Systems (Green Hubs). , 2011 .

[3]  Ove Frank,et al.  http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained , 2007 .

[4]  Zygmunt J. Haas,et al.  Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[5]  M. Newman,et al.  Statistical mechanics of networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Zhu Han,et al.  Manipulating the electricity power market via jamming the price signaling in smart grid , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[7]  Ian F. Akyildiz,et al.  A survey on wireless multimedia sensor networks , 2007, Comput. Networks.

[8]  Isabelle Herlin,et al.  Landslide tracking with a curve evolution model driven by interferometric data , 2003, IGARSS 2003. 2003 IEEE International Geoscience and Remote Sensing Symposium. Proceedings (IEEE Cat. No.03CH37477).

[9]  Yi Xu,et al.  The Speed of Information Propagation in Large Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[11]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[12]  R. Giovanini,et al.  EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.

[13]  William H. Sanders,et al.  Smart grid protocol testing through cyber-physical testbeds , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[14]  Terry V. Benzel,et al.  The DETER project: Advancing the science of cyber security experimentation and test , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[15]  Victor M. Preciado,et al.  Moment-Based Spectral Analysis of Large-Scale Networks Using Local Structural Information , 2010, IEEE/ACM Transactions on Networking.

[16]  Hamid Krim,et al.  Statistical classification of social networks , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Dogu Arifler,et al.  Information Theoretic Approach to Detecting Systematic Node Destructions in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.

[18]  Eitan Altman,et al.  Impact of Mobility on the Performance of Relaying in Ad Hoc Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[19]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[20]  Edmund M. Yeh,et al.  On the latency for information dissemination in mobile wireless networks , 2008, MobiHoc '08.

[21]  Brian D. O. Anderson,et al.  A Theory of Network Localization , 2006, IEEE Transactions on Mobile Computing.

[22]  James W. Vick,et al.  Homology Theory: An Introduction to Algebraic Topology , 1973 .

[23]  T. Liggett An Improved Subadditive Ergodic Theorem , 1985 .

[24]  Hamid Krim,et al.  A Generalized Markov Graph Model: Application to Social Network Analysis , 2013, IEEE Journal of Selected Topics in Signal Processing.

[25]  Hamid Krim,et al.  Distributed boundary tracking using alpha and Delaunay-Cech shapes , 2013, ArXiv.

[26]  Michael F. Worboys,et al.  Detecting basic topological changes in sensor networks by local aggregation , 2008, GIS '08.

[27]  Christian Bettstetter,et al.  On the minimum node degree and connectivity of a wireless multihop network , 2002, MobiHoc '02.

[28]  Hamid Krim,et al.  Divide and Conquer: Localizing Coverage Holes in Sensor Networks , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[29]  Wenye Wang,et al.  Design and Applications of A Smooth Mobility Model for Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[30]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[31]  Rong Zheng,et al.  Information Dissemination in Power-Constrained Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[32]  Andrea J. Goldsmith,et al.  Large wireless networks under fading, mobility, and delay constraints , 2004, IEEE INFOCOM 2004.

[33]  R. Ho Algebraic Topology , 2022 .

[34]  E. Xing,et al.  Discrete Temporal Models of Social Networks , 2006, SNA@ICML.

[35]  Majid Khabbazian,et al.  NIS02-1: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure , 2006, IEEE Globecom 2006.

[36]  Hamid Krim,et al.  Distributed Localization of Coverage Holes Using Topological Persistence , 2014, IEEE Transactions on Signal Processing.

[37]  Magnus Egerstedt,et al.  Control Using Higher Order Laplacians in Network Topologies , 2006 .

[38]  Nisheeth K. Vishnoi,et al.  On Generating Graphs with Prescribed Vertex Degrees for Complex Network Modeling 1 , 2003 .

[39]  Martin L. Shooman,et al.  Reliability of computer systems and networks , 2001 .

[40]  Donald F. Towsley,et al.  Dynamic Coverage of Mobile Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[41]  Jennifer C. Hou,et al.  Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application , 2006, MobiHoc '06.

[42]  Zhen Liu,et al.  Capacity, delay and mobility in wireless ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[43]  Mathew D. Penrose,et al.  Random Geometric Graphs , 2003 .

[44]  Lei Sun,et al.  On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobility , 2012, 2012 Proceedings IEEE INFOCOM.

[45]  H. Krim,et al.  Applied topology in static and dynamic sensor networks , 2012, 2012 International Conference on Signal Processing and Communications (SPCOM).

[46]  Harish Chintakunta,et al.  Topology and Geometry of Sensor Networks: A Distributed Computing Approach , 2013 .

[47]  Sheldon M. Ross,et al.  Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.

[48]  Lamine Mili,et al.  Power system and communication network co-simulation for smart grid applications , 2011, ISGT 2011.

[49]  Wenye Wang,et al.  A unified mobility model for analysis and simulation of mobile wireless networks , 2009, Wirel. Networks.

[50]  Nicolas Papadakis,et al.  A Variational Technique for Time Consistent Tracking of Curves and Motion , 2008, Journal of Mathematical Imaging and Vision.

[51]  Subhasri Duttagupta,et al.  Tracking Dynamic Boundaries Using Sensor Network , 2011, IEEE Transactions on Parallel and Distributed Systems.

[52]  Ramin Hekmat,et al.  Ad-hoc networks - fundamental properties and network topologies , 2006 .

[53]  Christian Bettstetter,et al.  Smooth is better than sharp: a random mobility model for simulation of wireless networks , 2001, MSWIM '01.

[54]  Alireza Tahbaz-Salehi,et al.  Distributed Coverage Verification in Sensor Networks Without Location Information , 2008, IEEE Transactions on Automatic Control.

[55]  Muriel Médard,et al.  High-reliability architectures for networks under stress , 2004, IEEE INFOCOM 2004.

[56]  François Baccelli,et al.  Impact of interferences on connectivity in ad hoc networks , 2005, IEEE/ACM Transactions on Networking.

[57]  Bin Wang,et al.  Detection and tracking of region-based evolving targets in sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[58]  P. Pattison LOGIT MODELS AND LOGISTIC REGRESSIONS FOR SOCIAL NETWORKS: I. AN INTRODUCTION TO MARKOV GRAPHS AND p* STANLEY WASSERMAN UNIVERSITY OF ILLINOIS , 1996 .

[59]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[60]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[61]  Dmitriy Morozov,et al.  Zigzag persistent homology and real-valued functions , 2009, SCG '09.

[62]  Wei Ren,et al.  Connectivity of cognitive radio networks: proximity vs. opportunity , 2009, CoRoNet '09.

[63]  Wenye Wang,et al.  On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[64]  Eitan Altman,et al.  Coverage and connectivity of ad hoc networks presence of channel randomness , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[65]  Namrata Vaswani,et al.  Tracking Deforming Objects Using Particle Filtering for Geometric Active Contours , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[66]  Stephen B. Wicker,et al.  On the behavior of communication links of a node in a multi-hop mobile environment , 2004, MobiHoc '04.

[67]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[68]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[69]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[70]  Ness B. Shroff,et al.  Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[71]  Jacques Janssen,et al.  Numerical Treatment of Homogeneous Semi-Markov Processes in Transient Case–a Straightforward Approach , 2004 .

[72]  Mathew D. Penrose,et al.  On k-connectivity for a geometric random graph , 1999, Random Struct. Algorithms.

[73]  Mingyan Liu,et al.  Sound mobility models , 2003, MobiCom '03.

[74]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[75]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[76]  Christopher Taylor,et al.  Localization in Sensor Networks , 2005, Handbook of Sensor Networks.

[77]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[78]  David Tse,et al.  Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[79]  Wenye Wang,et al.  Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes , 2006, 2006 IEEE International Conference on Communications.

[80]  Hamid Krim,et al.  Analysis and Control of Beliefs in Social Networks , 2014, IEEE Transactions on Signal Processing.

[81]  Michael McGuire,et al.  Stationary distributions of random walk mobility models for wireless ad hoc networks , 2005, MobiHoc '05.

[82]  B. Bollobás,et al.  Connectivity of random k-nearest-neighbour graphs , 2005, Advances in Applied Probability.

[83]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[84]  Daniel P. Heyman,et al.  Stochastic models in operations research , 1982 .

[85]  R. C. Williamson,et al.  Regularized principal manifolds , 2001 .

[86]  Jie Gao,et al.  Localization and routing in sensor networks by local angle information , 2005, MobiHoc '05.

[87]  Michael F. Worboys,et al.  Detecting Topological Change Using a Wireless Sensor Network , 2008, GIScience.

[88]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[89]  Anas AlMajali,et al.  Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack , 2012, CSET.

[90]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[91]  Hamid Krim,et al.  Detection and tracking of systematic time-evolving failures in sensor networks , 2011, 2011 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[92]  Arunabha Sen,et al.  Region-based connectivity - a new paradigm for design of fault-tolerant networks , 2009, 2009 International Conference on High Performance Switching and Routing.

[93]  Donald F. Towsley,et al.  Properties of random direction models , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[94]  Narsingh Deo,et al.  Degree-correlation of a Scale-free Random Graph Process , 2005 .

[95]  Yuval Peres,et al.  Mobile geometric graphs: detection, coverage and percolation , 2010, Probability Theory and Related Fields.

[96]  Deepa Kundur,et al.  Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.

[97]  Yuguang Fang,et al.  Portable movement modeling for PCS networks , 2000, IEEE Trans. Veh. Technol..

[98]  J. Pearl,et al.  Random geometric graphs: an algorithmic perspective , 2006 .

[99]  A. Jadbabaie,et al.  Decentralized Computation of Homology Groups in Networks by Gossip , 2007, 2007 American Control Conference.

[100]  Nikolaos Limnios,et al.  Semi-Markov Processes , 2001 .

[101]  Hamid Krim,et al.  Control and prediction of beliefs on social network , 2013, 2013 5th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[102]  Vin de Silva,et al.  Coordinate-free Coverage in Sensor Networks with Controlled Boundaries via Homology , 2006, Int. J. Robotics Res..

[103]  Paolo Giaccone,et al.  Capacity scaling in delay tolerant networks with heterogeneous mobile nodes , 2007, MobiHoc '07.

[104]  Elmar Gerhards-Padilla,et al.  BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.

[105]  David C. Moore,et al.  Robust distributed network localization with noisy range measurements , 2004, SenSys '04.

[106]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[107]  Arunabha Sen,et al.  A new metric for fault-tolerance in sensor networks , 2004, SenSys '04.

[108]  Hamid R. Sadjadpour,et al.  On mobility-capacity-delay trade-off in wireless ad hoc networks , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..

[109]  William H. Sanders,et al.  Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..

[110]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[111]  Massimo Franceschetti,et al.  Percolation in Multi-hop Wireless Networks , 2003 .

[112]  A. Yezzi,et al.  A variational framework for joint segmentation and registration , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).

[113]  Panganamala Ramana Kumar,et al.  The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.

[114]  W. Mendenhall,et al.  Statistics for engineering and the sciences , 1984 .

[115]  Eytan Modiano,et al.  Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.

[116]  Paolo Santi,et al.  The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[117]  Devavrat Shah,et al.  Throughput-delay trade-off in wireless networks , 2004, IEEE INFOCOM 2004.

[118]  Thomas F. La Porta,et al.  Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.

[119]  Mauro Leoncini,et al.  The k-Neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[120]  Patrick Thiran,et al.  Latency of wireless sensor networks with uncoordinated power saving mechanisms , 2004, MobiHoc '04.