Michael Riecker, Dingwen Yuan, Rachid El Bansarkhani, M. Hollick
{"title":"Patrolling wireless sensor networks: randomized intrusion detection","authors":"Michael Riecker, Dingwen Yuan, Rachid El Bansarkhani, M. Hollick","doi":"10.1145/2642687.2642697","DOIUrl":"https://doi.org/10.1145/2642687.2642697","url":null,"abstract":"Wireless sensor networks typically consist of highly resource-constrained motes. Hence, it is desirable to reduce the tasks of each mote to a minimum. We claim that even critical security functions such as intrusion detection can be performed by means of randomizing the detection frequency with the goal of making it more lightweight. To this end, we present Patrol, a system which distributes the load caused by various tasks across the network. Patrol makes use of tokens that are exchanged between nodes and activate a certain functionality, such as intrusion detection, temporarily. As a proof-of-concept, we design and implement within Patrol a lightweight intrusion detection algorithm based on the energy consumption of the nodes. We show that by analyzing the energy consumption, flooding attacks can be detected reliably. To illustrate these facts, we use a real-world testbed consisting of the widely-employed TelosB motes.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131003761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MAC-TCP cross-layer attack and its defense in cognitive radio networks","authors":"Dileep Nagireddygari, Johnson P. Thomas","doi":"10.1145/2642687.2642700","DOIUrl":"https://doi.org/10.1145/2642687.2642700","url":null,"abstract":"Existing research on attacks and security issues in Cognitive Radio networks focus on individual network layers. In this paper, we identify a cross-layer attack, which we call the MAC-TCP Cross-layer attack. This attack is launched from the MAC layer as the point of attack but the final target is to degrade TCP layer end to end throughput of flows by exploiting the TCP congestion control mechanism in cognitive radio. The chances of the attacker being detected are low owing to the fact that the target layer is different from the layer where the attack is launched. An adversary launches an attack on the MAC layer causing large variations in Round Trip Time (RTT) resulting in a large drop in throughput of TCP flows (drop of around 40% from our simulation results) but has little effect on the MAC-layer throughput and hence is very difficult to detect. A defense for this attack is proposed using a deterministic key pre-distribution algorithm where the keys are pre-distributed to nodes. Simulation results show that the throughput is restored to its original levels using key pre-distribution.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of experience-enabled social networks","authors":"Ahmed Abouzeid, M. Hormati, R. Glitho, F. Khendek","doi":"10.1145/2642687.2642701","DOIUrl":"https://doi.org/10.1145/2642687.2642701","url":null,"abstract":"Social Networks (SNs), such as Facebook, Twitter and LinkedIn, have become ubiquitous in our daily life. However, as the number of SN users grows there is higher demand for users' Quality of Experience (QoE). Some users may prefer to subscribe to a higher Quality of Service (QoS) level with their SN provider, e.g. to have higher priority on posting/retrieving, when for instance there are outages like the Twitter outage that happened during the Oscars 2014. In addition some users may wish to filter some posts, e.g. unwanted friendship requests. In this paper, we propose a novel architecture that enables differentiated QoS and information filtering in SNs to improve the users QoE. Our SN runs on top of 3GPP 4G Evolved Packet Core (EPC)-Based systems, and it uses EPC services to enable differentiated QoS. The components of our architecture interact through RESTful web services. Our architecture allows users to filter posts through their own criteria and have priority over other users in posting and/or retrieving.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116757269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabian Lanze, A. Panchenko, Ignacio Ponce-Alcaide, T. Engel
{"title":"Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11","authors":"Fabian Lanze, A. Panchenko, Ignacio Ponce-Alcaide, T. Engel","doi":"10.1145/2642687.2642691","DOIUrl":"https://doi.org/10.1145/2642687.2642691","url":null,"abstract":"Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their traffic is referred to in the literature as the emph{evil twin attack}. It allows an attacker with little effort and expenditure to fake a genuine AP and intercept, collect, or alter (potentially even encrypted) data. Due to its severity, the topic has gained remarkable research interest in the past decade. In this paper, we introduce a differentiated attacker model to express the attack in all its facets. We propose a taxonomy for classifying and structuring countermeasures and apply it to existing approaches. We are the first to conduct a comprehensive survey in this domain to reveal the potential and the limits of state-of-the-art solutions. Our study discloses an important attack scenario which has not been addressed so far, i.e., the usage of specialized software to mount the attack. We propose and experimentally validate a novel method to detect evil twin APs operated by software within a few seconds.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130717938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Palomares, D. Migault, Hendrik Hendrik, M. Laurent-Maknavicius, G. Pujolle
{"title":"Elastic virtual private cloud","authors":"Daniel Palomares, D. Migault, Hendrik Hendrik, M. Laurent-Maknavicius, G. Pujolle","doi":"10.1145/2642687.2642704","DOIUrl":"https://doi.org/10.1145/2642687.2642704","url":null,"abstract":"Several Virtual Private Networks are based on IPsec. However, IPsec has not been designed with elasticity in mind, which makes clusters of IPsec security gateways hard to manage for providing high Service Level Agreement (SLA). Thus, these SG clusters need management techniques to maintain their Quality of Service. For example, ISPs use VPNs to secure millions of communications when offloading End-Users from Radio Access Networks towards alternative access networks such as WLANs. Additionally, Virtual Private Cloud (VPC) providers also handle thousands of VPN connections when remote EUs access private clouds services. This paper describes how to provide Traffic Management (TM) and High Availability (HA) for VPN infrastructures by sharing or transferring an IPsec session. TM and HA have been implemented and evaluated over a 2-nodes cluster. We measured their impact on a real time audio streaming simulating a phone conversation. We found out that over a 2 minutes conversation, the impact on QoS measured with POLQA while applying TM or HA, is less than 3%.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128033731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective service capacity analysis of opportunistic multi-carrier OFDMA systems","authors":"J. Gross, Marco Weyres, A. Wolisz","doi":"10.1145/2387218.2387222","DOIUrl":"https://doi.org/10.1145/2387218.2387222","url":null,"abstract":"Exact queuing-theoretic modeling of wireless systems is tough due to the complex service processes that arise from the interaction of the wireless channel with state-of-the-art signal processing algorithms. Nevertheless, with the rise of video applications like streaming and telephony in upcoming fourth generation cellular networks, such analysis is important for devising admission control strategies. In this paper we apply recent insights into approximation approaches for queuing systems to opportunistic OFDMA systems and study different approaches for applying the modulation type to OFDM subcarriers. In particular, we provide analytical closed-form expressions for the delay distribution of three opportunistically scheduling OFDMA systems (adaptive modulation, link adaptation per terminal, link adaptation over all subcarriers). After validating these expressions, we evaluate the different system designs numerically. We find that although adaptive modulation systems have a higher complexity, their queuing performance is only slightly superior to systems with link adaptation per terminal. Furthermore, the systems feature in general an optimal number of terminals that can be supported in the cell, leveraging multi-user diversity with limited available resources. Nevertheless, these optima change from scheme to scheme.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near optimal multicoloring for inter-cluster interference avoidance","authors":"Fabien Esmiol, S. Rousseau, V. Conan, C. Bonnet","doi":"10.1145/2387218.2387221","DOIUrl":"https://doi.org/10.1145/2387218.2387221","url":null,"abstract":"In this paper, we consider conflict-free resource assignment in clustered wireless mesh networks. Transmissions within a cluster of neighboring nodes can be scheduled by the cluster-head, a leader in the cluster. Avoiding interferences between neighboring clusters is usually addressed as a coloring problem by the literature. We first propose a new formulation of this problem, and express it as a multicoloring problem, each color representing a slice of conflict-free resources (e.g. a set of TDMA frames). We further propose CCSA (Clustering Configuration for slots assignment), a novel distributed algorithm that implements a heuristics for the multicoloring problem. We provide simulation results on networks of 100 nodes that compare CCSA to super-frame, the closest state-of-the art solution and to an upper bound provided by a linear program solving the multicoloring problem. Simulations results show that CCSA provides double capacity over super-frame and reaches 80% of the upper bound.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126820858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Julien Boite, V. Conan, G. Nguengang, M. Bouet, A. Ploix, D. Gaïti
{"title":"Scaling end-to-end measurements in heterogeneous wireless mesh networks","authors":"Julien Boite, V. Conan, G. Nguengang, M. Bouet, A. Ploix, D. Gaïti","doi":"10.1145/2387218.2387220","DOIUrl":"https://doi.org/10.1145/2387218.2387220","url":null,"abstract":"In large scale deployments of Wireless Mesh Networks (WMNs), access to the Internet is ensured by multiple gateways spread over the network. In such environments that rely on heterogeneous backhaul technologies offering different and time-varying bandwidth, delay or jitter characteristics, monitoring the end-to-end performances on the diversity of paths Internet flows can be forwarded on is challenging: the end-to-end measurement strategy must capture the diversity of backhaul connections, as well as multi-hop behavior within the mesh, and it must scale with the number of gateways, nodes and flows. In this paper we propose and evaluate the scalability of two measurement strategies for the monitoring of end-to-end paths. We establish closed form formulas for the overhead incurred by these measurement strategies, and compare their efficiency against greedy measurements in grid topologies. We conclude that one can reach linear increase in the number of probing nodes in place of an exponential growth for greedy end-to-end measurements. We extend these results to also show that this strategy takes advantage of dense topologies.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noureddine Chaib, N. Lagraa, M. Yagoubi, Abderrahmane Lakas
{"title":"Unthresholded adaptive revocation technique in mobile ad hoc networks","authors":"Noureddine Chaib, N. Lagraa, M. Yagoubi, Abderrahmane Lakas","doi":"10.1145/2387218.2387233","DOIUrl":"https://doi.org/10.1145/2387218.2387233","url":null,"abstract":"Removing malicious nodes from any network is vital to its correct operation and enhances largely its security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them is reached. The problem of threshold based revocation schemes is that any colluding set of malicious nodes surpassing the threshold can revoke nodes in the networks at will. Lowering the threshold value, would make coalition attacks against the revocation protocol easier. Whereas increasing the threshold value would make the revocation of malicious nodes difficult. In this paper, we propose a new revocation scheme for mobile ad hoc networks which deals with the revocation problem adaptively, so that it allows the revocation of smaller sets of colluding malicious nodes easier, meanwhile it controls the number of erroneously revoked nodes caused by big sets of colluding attackers.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A wireless sensor network based water monitoring system","authors":"S. Rekhis, N. Ellouze, N. Boudriga","doi":"10.1145/2387218.2387225","DOIUrl":"https://doi.org/10.1145/2387218.2387225","url":null,"abstract":"Several water quality monitoring systems were proposed in literature. However, these systems are highly expensive and complex, offer inaccurate pollution positions, and do not perform auto-diagnosis to recover from faults and cope with the characteristics of the monitored environment. In this paper, we propose a novel water quality monitoring platform which combines Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID) systems. In fact, the system uses a set of fixed RFID tags that are deployed next to the waterway and a set of mobile sensor nodes which integrate RFID readers. This platform can offer several enhancements in comparison to the existing water monitoring platforms such as: reduced cost, low energy consumption, scalability, system performance monitoring, and tolerance to errors and loss of information.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123490300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}