On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols

This paper demonstrates the provable superiority of multi-path routing protocols over other conventional protocols in Wireless Mesh Networks (WMNs) against blocking, node- isolation and network-partitioning type-attacks. Though the underlying network model is of a WMN with mobile nodes, the results in this paper are equally applicable to other types of wireless data networks. The adversarial objective is to isolate a subset of network nodes through minimal cost optimal blocking of certain number of paths in the network (or partitioning the network). If less than a certain threshold of traffic from such node(s) reaches the routers, the adversary is successful. Two scenarios viz. (a) low mobility for network nodes, and (b) high degree of node mobility, are evaluated. Scenario (a) is proven to be NP-hard and scenario (b) is proven to be #P-hard for the adversary to achieve the goal. Further, several approximation algorithms are presented which show that even in the best case scenario it is at least exponentially hard for the adversary to optimally succeed in such blocking-type attacks. Simulations verify the results and demonstrate the robustness of multi-path protocols against such attacks. The objective of this paper is to study the performance and feasibility of multi-path wireless protocols over conventional single-path protocols from a security angle. To the best of our knowledge, this is the first paper to theoretically evaluate the attack-resiliency and performance of multi-path protocols with network node mobility.

[1]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[2]  David S. Johnson,et al.  Approximation algorithms for combinatorial problems , 1973, STOC.

[3]  Steven M. Bellovin,et al.  Using Link Cuts to Attack Internet Routing , 2003 .

[4]  Yu-Chee Tseng,et al.  A Multi-Path QoS Routing Protocol in a Wireless Mobile Ad Hoc Network , 2000, Telecommun. Syst..

[5]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[6]  Rajiv Gandhi,et al.  Approximation algorithms for partial covering problems , 2004, J. Algorithms.

[7]  László Lovász,et al.  On the ratio of optimal integral and fractional covers , 1975, Discret. Math..

[8]  Ivan Damgård,et al.  A Length-Flexible Threshold Cryptosystem with Applications , 2003, ACISP.

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  Stephen A. Cook,et al.  The complexity of theorem-proving procedures , 1971, STOC.

[11]  Jörg Widmer,et al.  Network coding: an instant primer , 2006, CCRV.

[12]  J. Ghosh,et al.  Sociological orbit based mobility profiling and routing for wireless networks , 2006 .

[13]  Brian Wellington,et al.  OSPF with Digital Signatures , 1997, RFC.

[14]  Michael Kearns,et al.  Computational complexity of machine learning , 1990, ACM distinguished dissertations.

[15]  Christos H. Papadimitriou,et al.  Computational complexity , 1993 .

[16]  John Moy,et al.  OSPF Version 2 , 1998, RFC.

[17]  Vasek Chvátal,et al.  A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..

[18]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[19]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[20]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[21]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[22]  Erez Petrank The hardness of approximation: Gap location , 2005, computational complexity.

[23]  Nitin H. Vaidya,et al.  Load balancing routing in multi-channel hybrid wireless networks with single network interface , 2005, Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE'05).

[24]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[25]  Ying-Hong Wang,et al.  Interfering-aware QoS multipath routing for ad hoc wireless network , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..