Cyber Maneuver Against External Adversaries and Compromised Nodes

This article identifies the research issues and challenges from jamming and other attacks by external sources and insiders. Based on the spirit of cyber maneuver, it proposes a general framework to deal with such issues. Central to our framework is the notion of maneuver keys as spread-spectrum keys; they supplement the higher-level network cryptographic keys and provide the means to resist and respond to external and insider attacks. The framework also includes components for attack detection, identification of compromised nodes, and group rekeying that excludes compromised nodes. At this stage, much research is still needed on the design of each component as well as integrating these components seamlessly.

[1]  Don Torrieri Principles of Spread-Spectrum Communication Systems, 2nd Edition , 2011 .

[2]  K. Bakhru,et al.  Direction Finding for Spread-Spectrum Systems with Adaptive Arrays , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[3]  Don Torrieri,et al.  Principles of Spread-Spectrum Communication Systems , 2004 .

[4]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[5]  Srikanth V. Krishnamurthy,et al.  Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[6]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[7]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[8]  Michele Nogueira Lima,et al.  Survivable key management on WANETs , 2011, IEEE Wireless Communications.

[9]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[10]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[11]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[12]  Klara Nahrstedt,et al.  A novel approach to identify insider-based jamming attacks in multi-channel wireless networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[13]  Sencun Zhu,et al.  Compromise-Resilient Anti-jamming for Wireless Sensor Networks , 2010, ICICS.

[14]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[15]  Yih-Chun Hu,et al.  Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.

[16]  Don J. Torrieri,et al.  Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..

[17]  Mudhakar Srivatsa,et al.  The fable of the bees: incentivizing robust revocation decision making in ad hoc networks , 2009, CCS.

[18]  Josef Pieprzyk,et al.  Broadcast anti-jamming systems , 2001, Comput. Networks.

[19]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[20]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[21]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[22]  Suzanne Hassell,et al.  Using cyber maneuver to improve network resiliency , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[23]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.