Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks

Blackhole fast-moving attackers are effective against the First-Contact protocol.Flooding fast-moving attackers are effective against the Epidemic protocol.Mixed blackhole and flooding are effective against the Spray-and-Wait protocol.MaxProp is resilient; flooding attackers will mildly affect the protocol. Increasingly more digital communication is routed among wireless, mobile computers over ad-hoc, unsecured communication channels. In this paper, we design two stochastic search algorithms (a greedy heuristic, and an evolutionary algorithm) which automatically search for strong insider attack methods against a given ad-hoc, delay-tolerant communication protocol, and thus expose its weaknesses. To assess their performance, we apply the two algorithms to two simulated, large-scale mobile scenarios (of different route morphology) with 200 nodes having free range of movement. We investigate a choice of two standard attack strategies (dropping messages and flooding the network), and four delay-tolerant routing protocols: First Contact, Epidemic, Spray and Wait, and MaxProp. We find dramatic drops in performance: replicative protocols (Epidemic, Spray and Wait, MaxProp), formerly deemed resilient, are compromised to different degrees (delivery rates between 24% and 87%), while a forwarding protocol (First Contact) is shown to drop delivery rates to under 5% in all cases by well-crafted attack strategies and with an attacker group of size less than 10% the total network size. Overall, we show that the two proposed methods combined constitute an effective means to discover (at design-time) and raise awareness about the weaknesses and strengths of existing ad-hoc, delay-tolerant communication protocols against potential malicious cyber-attacks.

[1]  Xianbin Wang,et al.  Wireless Sensor Network Reliability and Security in Factory Automation: A Survey , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[2]  Mun Choon Chan,et al.  Robustness of DTN against routing attacks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[3]  Dario Floreano,et al.  Gaining Insight into Quality Diversity , 2016, GECCO.

[4]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.

[5]  Stephen Farrell,et al.  DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.

[6]  Kenneth O. Stanley,et al.  Confronting the Challenge of Quality Diversity , 2015, GECCO.

[7]  Nicholas R. Jennings,et al.  Self-organized routing for wireless microsensor networks , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[9]  Jie Wu,et al.  Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Doina Bucur,et al.  Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms , 2016, Appl. Soft Comput..

[11]  Jie Tang,et al.  Influence Maximization in Dynamic Social Networks , 2013, 2013 IEEE 13th International Conference on Data Mining.

[12]  Rabin K. Patra,et al.  Routing in a delay tolerant network , 2004, SIGCOMM '04.

[13]  Ke Xu,et al.  A Survey of Social-Aware Routing Protocols in Delay Tolerant Networks: Applications, Taxonomy and Design-Related Issues , 2014, IEEE Communications Surveys & Tutorials.

[14]  Cristina Alcaraz,et al.  A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[15]  Doina Bucur,et al.  Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks , 2015, EvoApplications.

[16]  Jean-Baptiste Mouret,et al.  Illuminating search spaces by mapping elites , 2015, ArXiv.

[17]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[18]  Xin Yao,et al.  Fast Evolution Strategies , 1997, Evolutionary Programming.

[19]  Richard R. Brooks,et al.  Mobile Network Analysis Using Probabilistic Connectivity Matrices , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[20]  John Burgess,et al.  Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.

[21]  Giovanni Squillero,et al.  Evolutionary Optimization: the µGP toolkit , 2011 .

[22]  Giovanni Squillero,et al.  Divergence of character and premature convergence: A survey of methodologies for promoting diversity in evolutionary optimization , 2016, Inf. Sci..

[23]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[24]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[25]  Doina Bucur,et al.  The impact of topology on energy consumption for collection tree protocols: An experimental assessment through evolutionary computation , 2014, Appl. Soft Comput..

[26]  Kenneth O. Stanley,et al.  Abandoning Objectives: Evolution Through the Search for Novelty Alone , 2011, Evolutionary Computation.