Learning to Detect and Mitigate Cross-layer Attacks in Wireless Networks: Framework and Applications

被引:0
|
作者
Zhang, Liyang [1 ]
Restuccia, Francesco [1 ]
Melodia, Tommaso [1 ]
Pudlewski, Scott M. [2 ]
机构
[1] Northeastern Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
[2] RITF, Air Force Res Lab, Rome, NY 13440 USA
关键词
ALLOCATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting and mitigating cross-layer attacks still remains unsolved. For this reason, in this paper we propose a novel framework to analyze and address cross-layer attacks in wireless networks. Specifically, our framework consists of a detection and a mitigation component. The attack detection component is based on a Bayesian learning detection scheme that constructs a model of observed evidence to identify stealthy attack activities. The mitigation component comprises a scheme that achieves the desired trade-off between security and performance. We specialize and evaluate the proposed framework by considering a specific cross-layer attack that uses jamming as an auxiliary tool to achieve route manipulation. Simulations and experimental results obtained with a testbed made up by USRP software-defined radios demonstrate the effectiveness of the proposed methodology.
引用
收藏
页码:299 / 307
页数:9
相关论文
共 50 条
  • [1] Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications
    Zhang, Liyang
    Restuccia, Francesco
    Melodia, Tommaso
    Pudlewski, Scott M.
    2017 IEEE Conference on Communications and Network Security, CNS 2017, 2017, 2017-January : 1 - 9
  • [2] A cross-layer approach to detect jamming attacks in wireless ad hoc networks
    Thamilarasu, Geethapriya
    Mishra, Sumita
    Sridhar, Ramalingam
    MILCOM 2006, VOLS 1-7, 2006, : 2586 - +
  • [3] Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning Approach
    Zhang, Liyang
    Restuccia, Francesco
    Melodia, Tommaso
    Pudlewski, Scott M.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (07) : 1688 - 1702
  • [4] A Framework for Cross-Layer Measurements in Wireless Networks
    Kyriakopoulos, Konstantinos G.
    Whittow, William G.
    Parish, David J.
    AICT: 2009 FIFTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2009, : 237 - 242
  • [5] A Communication Framework supporting Cross-Layer Design for Wireless Networks
    Kim, Byounghoon
    Tak, Sungwoo
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 232 - 237
  • [6] A Framework for Cross-Layer Optimization of Video Streaming in Wireless Networks
    Hsu, Cheng-Hsin
    Hefeeda, Mohamed
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2011, 7 (01)
  • [7] A Cross-Layer Framework for Association Control in Wireless Mesh Networks
    Athanasiou, George
    Korakis, Thanasis
    Ercetin, Ozgur
    Tassiulas, Leandros
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (01) : 65 - 80
  • [8] Game model for detecting cross-layer attacks in wireless ad hoc networks
    Wang J.
    Liu X.
    Jiang S.
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2022, 44 (01): : 114 - 121
  • [9] Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks
    Bian, Kaigui
    Park, Jung-Min
    Chen, Ruiliang
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [10] Cross-layer design for wireless networks
    Shakkottai, S
    Rappaport, TS
    Karlsson, PC
    IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (10) : 74 - 80