Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed Networks

Jordi Navarrette, S. Shankar, Xiaojie Zhang, S. Debroy
{"title":"Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed Networks","authors":"Jordi Navarrette, S. Shankar, Xiaojie Zhang, S. Debroy","doi":"10.1109/DRCN48652.2020.1570610618","DOIUrl":null,"url":null,"abstract":"Security vulnerabilities that are unique to unlicensed (secondary) networks have been well studied in literature. However, the nature and impact of traditional wireless network threats, such as backoff manipulation when applied to secondary networks, require further investigation in particular for multiple rogue station scenarios. In this paper, we perform modeling and analysis of multi-rogue backoff manipulation attack strategies in secondary wireless networks using the PRISM probabilistic model checker. Our secondary network implementation in PRISM includes scenarios where: a) sub-band (channel) occupancy by licensed (primary) nodes follows an ON-OFF model with parameters derived from real measurement data and b) the secondary network consists of up to three rogue secondary stations out of eight total with all following CSMA/CA like contention process for channel access. Unlike honest secondary stations, the rogues carry out a backoff-manipulation strategy of selecting a backoff timer that deviates from the backoff-selection process mandated by the secondary network. Unlike simulation based analysis, our analysis using PRISM model checker considers all possible combinations of system parameters and proves that for any set of primary ONOFF parameters and for any density of rogues in the network, a fixed backoff selection (instead of random) maximizes the channel access probability of a particular rogue irrespective of other rogues’ selection strategy. The results from this work will help generate deeper understanding of medium access threat landscape of secondary networks and foster design of more resilient access control strategies.","PeriodicalId":334421,"journal":{"name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","volume":"250 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DRCN48652.2020.1570610618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Security vulnerabilities that are unique to unlicensed (secondary) networks have been well studied in literature. However, the nature and impact of traditional wireless network threats, such as backoff manipulation when applied to secondary networks, require further investigation in particular for multiple rogue station scenarios. In this paper, we perform modeling and analysis of multi-rogue backoff manipulation attack strategies in secondary wireless networks using the PRISM probabilistic model checker. Our secondary network implementation in PRISM includes scenarios where: a) sub-band (channel) occupancy by licensed (primary) nodes follows an ON-OFF model with parameters derived from real measurement data and b) the secondary network consists of up to three rogue secondary stations out of eight total with all following CSMA/CA like contention process for channel access. Unlike honest secondary stations, the rogues carry out a backoff-manipulation strategy of selecting a backoff timer that deviates from the backoff-selection process mandated by the secondary network. Unlike simulation based analysis, our analysis using PRISM model checker considers all possible combinations of system parameters and proves that for any set of primary ONOFF parameters and for any density of rogues in the network, a fixed backoff selection (instead of random) maximizes the channel access probability of a particular rogue irrespective of other rogues’ selection strategy. The results from this work will help generate deeper understanding of medium access threat landscape of secondary networks and foster design of more resilient access control strategies.
非授权网络中多流氓退避操纵攻击的形式化建模与分析
非授权(辅助)网络特有的安全漏洞已经在文献中得到了很好的研究。然而,传统无线网络威胁的性质和影响,例如应用于二级网络时的后退操作,需要进一步调查,特别是针对多个流氓站的情况。本文利用PRISM概率模型检查器对二次无线网络中的多流氓退避操纵攻击策略进行建模和分析。我们在PRISM中的辅助网络实现包括以下场景:a)许可(主)节点的子带(信道)占用遵循基于实际测量数据的参数的ON-OFF模型;b)辅助网络由总共8个中的最多3个无赖辅助站组成,所有辅助站都遵循CSMA/CA类似的信道访问争用过程。与诚实的辅助站不同,流氓执行一种后退操纵策略,即选择一个偏离辅助网络强制后退选择过程的后退计时器。与基于仿真的分析不同,我们使用PRISM模型检查器的分析考虑了系统参数的所有可能组合,并证明对于任何一组主要ONOFF参数和网络中任何流氓密度,固定的backoff选择(而不是随机的)最大化了特定流氓的通道访问概率,而不考虑其他流氓的选择策略。这项工作的结果将有助于更深入地了解次级网络的中等访问威胁情况,并促进更具弹性的访问控制策略的设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信