Jaime Zuniga-Mejia, Rafaela Villalpando Hernandez, C. V. Rosales
{"title":"基于根轨迹的可重构无线网络路由攻击检测鲁棒性研究","authors":"Jaime Zuniga-Mejia, Rafaela Villalpando Hernandez, C. V. Rosales","doi":"10.1145/3345860.3361511","DOIUrl":null,"url":null,"abstract":"Data routing is one of the most essential functions having a direct impact on network performance. Due to the lack of any fixed infrastructure, data routing must be achieved through collaboration of nodes in Reconfigurable Wireless Networks (RWN). This implies that a malicious node can participate in the routing process and launch an attack to gain control over data traffic. Intrusion Detection Systems (IDS) are typically used to recognize malicious activities. Any IDS for routing attack-detection in RWN should be able to detect a wide variety of attacks and must have into consideration the computing and power restrictions that some nodes could have. A mathematical framework for a root locus based IDS for routing in RWN has been presented in recent literature achieving promising attack-detection accuracy for a case study. This root locus based IDS consists in modeling the dynamic behavior of neighboring nodes at a given instant as a linear system. In this paper, we analyze through simulations the attack-detection performance of that root locus based IDS for the worst case, where the number of delayed samples of the signals used to characterize the system, is minimum. We show that even for these severely restricted models, the analyzed attack-detection scheme is robust enough to be used in a wide range of network conditions. We analyze the method performance for a wide variety of routing attacks, the effects of node mobility, attacker's position and different node densities.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Robustness of Root Locus based Routing Attack-Detection in Reconfigurable Wireless Networks\",\"authors\":\"Jaime Zuniga-Mejia, Rafaela Villalpando Hernandez, C. V. Rosales\",\"doi\":\"10.1145/3345860.3361511\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data routing is one of the most essential functions having a direct impact on network performance. Due to the lack of any fixed infrastructure, data routing must be achieved through collaboration of nodes in Reconfigurable Wireless Networks (RWN). This implies that a malicious node can participate in the routing process and launch an attack to gain control over data traffic. Intrusion Detection Systems (IDS) are typically used to recognize malicious activities. Any IDS for routing attack-detection in RWN should be able to detect a wide variety of attacks and must have into consideration the computing and power restrictions that some nodes could have. A mathematical framework for a root locus based IDS for routing in RWN has been presented in recent literature achieving promising attack-detection accuracy for a case study. This root locus based IDS consists in modeling the dynamic behavior of neighboring nodes at a given instant as a linear system. In this paper, we analyze through simulations the attack-detection performance of that root locus based IDS for the worst case, where the number of delayed samples of the signals used to characterize the system, is minimum. We show that even for these severely restricted models, the analyzed attack-detection scheme is robust enough to be used in a wide range of network conditions. We analyze the method performance for a wide variety of routing attacks, the effects of node mobility, attacker's position and different node densities.\",\"PeriodicalId\":55557,\"journal\":{\"name\":\"Ad Hoc & Sensor Wireless Networks\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2019-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ad Hoc & Sensor Wireless Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1145/3345860.3361511\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc & Sensor Wireless Networks","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3345860.3361511","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
On the Robustness of Root Locus based Routing Attack-Detection in Reconfigurable Wireless Networks
Data routing is one of the most essential functions having a direct impact on network performance. Due to the lack of any fixed infrastructure, data routing must be achieved through collaboration of nodes in Reconfigurable Wireless Networks (RWN). This implies that a malicious node can participate in the routing process and launch an attack to gain control over data traffic. Intrusion Detection Systems (IDS) are typically used to recognize malicious activities. Any IDS for routing attack-detection in RWN should be able to detect a wide variety of attacks and must have into consideration the computing and power restrictions that some nodes could have. A mathematical framework for a root locus based IDS for routing in RWN has been presented in recent literature achieving promising attack-detection accuracy for a case study. This root locus based IDS consists in modeling the dynamic behavior of neighboring nodes at a given instant as a linear system. In this paper, we analyze through simulations the attack-detection performance of that root locus based IDS for the worst case, where the number of delayed samples of the signals used to characterize the system, is minimum. We show that even for these severely restricted models, the analyzed attack-detection scheme is robust enough to be used in a wide range of network conditions. We analyze the method performance for a wide variety of routing attacks, the effects of node mobility, attacker's position and different node densities.
期刊介绍:
Ad Hoc & Sensor Wireless Networks seeks to provide an opportunity for researchers from computer science, engineering and mathematical backgrounds to disseminate and exchange knowledge in the rapidly emerging field of ad hoc and sensor wireless networks. It will comprehensively cover physical, data-link, network and transport layers, as well as application, security, simulation and power management issues in sensor, local area, satellite, vehicular, personal, and mobile ad hoc networks.