Three theories for delays, clocks and security in wireless networks

P. Kumar
{"title":"Three theories for delays, clocks and security in wireless networks","authors":"P. Kumar","doi":"10.1145/2348543.2348546","DOIUrl":null,"url":null,"abstract":"We propose three theories, which can be regarded as attempts to characterize and establish guaranteed properties of wireless networks: (i) How and to what extent can we deliver packets with hard delay bounds? (ii) How and to what extent can we synchronize clocks in wireless networks? (iii) Can we develop provably secure protocols for the entire life-cycle of wireless networks that also optimize a utility measure while operating in a hostile environment? For the first problem, consider an access point serving several clients over unreliable wireless links. Suppose packets arrive for/from the clients, with each packet having a hard deadline, after which it is dropped. We characterize precisely the mix of delivery ratios, channel unreliabilities and hard deadline that the access point can guarantee, under some models. For the second problem, consider a wireless network where clocks at the nodes are linear, though with different rates (skews) and offsets. Nodes can exchange packets with their neighbors, with direction dependent delays. We characterize precisely to what extent clocks can and cannot be synchronized and delays determined. Under a random model the end-to-end error can be kept bounded irrespective of network size. Concerning the third problem, traditionally, wireless protocols have been developed to provide performance. As attacks are identified, the protocols are fortified against the identified vulnerabilities. However, holistic guarantees are not provided against other attacks. We seek to reverse this paradigm. We propose a provable approach that guarantees the protocol suite is secure when the nodes are subject to certain assumptions. The protocols take a set of good nodes mingled with unknown malicious nodes from primordial birth to an operating network, while attaining min-max of a utility function. The maximization is over protocols announced and followed by the good nodes, and the minimization is over all behaviors of the malicious nodes. Further, the malicious nodes are reduced to either cooperating or jamming. [Joint work with Vivek Borkar, Nikolaos Freris, Scott Graham, I-Hong Hou, Yih-Chun Hu, Jonathan Ponniah and Roberto Solis].","PeriodicalId":378295,"journal":{"name":"ACM/IEEE International Conference on Mobile Computing and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM/IEEE International Conference on Mobile Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2348543.2348546","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We propose three theories, which can be regarded as attempts to characterize and establish guaranteed properties of wireless networks: (i) How and to what extent can we deliver packets with hard delay bounds? (ii) How and to what extent can we synchronize clocks in wireless networks? (iii) Can we develop provably secure protocols for the entire life-cycle of wireless networks that also optimize a utility measure while operating in a hostile environment? For the first problem, consider an access point serving several clients over unreliable wireless links. Suppose packets arrive for/from the clients, with each packet having a hard deadline, after which it is dropped. We characterize precisely the mix of delivery ratios, channel unreliabilities and hard deadline that the access point can guarantee, under some models. For the second problem, consider a wireless network where clocks at the nodes are linear, though with different rates (skews) and offsets. Nodes can exchange packets with their neighbors, with direction dependent delays. We characterize precisely to what extent clocks can and cannot be synchronized and delays determined. Under a random model the end-to-end error can be kept bounded irrespective of network size. Concerning the third problem, traditionally, wireless protocols have been developed to provide performance. As attacks are identified, the protocols are fortified against the identified vulnerabilities. However, holistic guarantees are not provided against other attacks. We seek to reverse this paradigm. We propose a provable approach that guarantees the protocol suite is secure when the nodes are subject to certain assumptions. The protocols take a set of good nodes mingled with unknown malicious nodes from primordial birth to an operating network, while attaining min-max of a utility function. The maximization is over protocols announced and followed by the good nodes, and the minimization is over all behaviors of the malicious nodes. Further, the malicious nodes are reduced to either cooperating or jamming. [Joint work with Vivek Borkar, Nikolaos Freris, Scott Graham, I-Hong Hou, Yih-Chun Hu, Jonathan Ponniah and Roberto Solis].
无线网络延迟、时钟和安全的三种理论
我们提出了三种理论,可以看作是尝试描述和建立无线网络的保证属性:(i)我们如何以及在多大程度上可以传递具有硬延迟界限的数据包?(ii)我们如何及在何种程度上可以在无线网络中同步时钟?(iii)我们能否为无线网络的整个生命周期开发可证明安全的协议,同时在恶劣环境中运行时优化效用测量?对于第一个问题,考虑一个接入点通过不可靠的无线链路为多个客户机提供服务。假设数据包到达/来自客户端,每个数据包都有一个硬截止日期,超过该截止日期将被丢弃。我们精确地描述了在某些模型下接入点可以保证的交付比率、信道不可靠性和硬截止日期的混合特征。对于第二个问题,考虑一个无线网络,其中节点的时钟是线性的,尽管具有不同的速率(倾斜)和偏移量。节点可以通过方向相关延迟与邻居交换数据包。我们精确地描述了时钟能在多大程度上同步,不能在多大程度上延迟。在随机模型下,无论网络大小如何,端到端误差都是有界的。关于第三个问题,传统上,无线协议的发展是为了提供性能。一旦识别出攻击,协议就会针对识别出的漏洞进行强化。但是,不提供针对其他攻击的整体保证。我们试图扭转这种模式。我们提出了一种可证明的方法,保证在节点服从某些假设时协议套件是安全的。该协议将一组混杂着未知恶意节点的良好节点从原始诞生到运行网络,同时实现效用函数的最小-最大。最大化是指良好节点宣布并遵循的协议,最小化是指恶意节点的所有行为。进一步,将恶意节点简化为合作或干扰。[与Vivek Borkar, Nikolaos Freris, Scott Graham, I-Hong Hou, Yih-Chun Hu, Jonathan Ponniah and Roberto Solis合作]。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信