Learning to Detect and Mitigate Cross-layer Attacks in Wireless Networks: Framework and Applications

被引:0
|
作者
Zhang, Liyang [1 ]
Restuccia, Francesco [1 ]
Melodia, Tommaso [1 ]
Pudlewski, Scott M. [2 ]
机构
[1] Northeastern Univ, Dept Elect & Comp Engn, Boston, MA 02215 USA
[2] RITF, Air Force Res Lab, Rome, NY 13440 USA
关键词
ALLOCATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting and mitigating cross-layer attacks still remains unsolved. For this reason, in this paper we propose a novel framework to analyze and address cross-layer attacks in wireless networks. Specifically, our framework consists of a detection and a mitigation component. The attack detection component is based on a Bayesian learning detection scheme that constructs a model of observed evidence to identify stealthy attack activities. The mitigation component comprises a scheme that achieves the desired trade-off between security and performance. We specialize and evaluate the proposed framework by considering a specific cross-layer attack that uses jamming as an auxiliary tool to achieve route manipulation. Simulations and experimental results obtained with a testbed made up by USRP software-defined radios demonstrate the effectiveness of the proposed methodology.
引用
收藏
页码:299 / 307
页数:9
相关论文
共 50 条
  • [31] A tutorial on cross-layer optimization in wireless networks
    Lin, Xiaojun
    Shroff, Ness B.
    Srikant, R.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (08) : 1452 - 1463
  • [32] Cross-Layer Contextual Interactions in Wireless Networks
    Edirisinghe, Ruwini
    Zaslavsky, Arkady
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 1114 - 1134
  • [33] CLOE: Cross-layer design for wireless networks
    Hager, C.
    Shyy, D. J.
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 1583 - 1587
  • [34] Wireless mobile networks: Cross-layer communication
    Chao, H. C.
    Huang, C. M.
    Guizani, M.
    Kuo, S. Y.
    Skarmeta, A. F. G.
    Seah, W.
    IET COMMUNICATIONS, 2007, 1 (05) : 819 - 820
  • [35] Cross-layer routing in Wireless Mesh Networks
    Iannone, L
    Khalili, R
    Salamatian, K
    Fdida, S
    1ST INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS 2004, PROCEEDINGS, 2004, : 319 - 323
  • [36] A cross-layer protocol for wireless sensor networks
    Akyildiz, Ian F.
    Vuran, Mehmet C.
    Akan, Ozgur B.
    2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1102 - 1107
  • [37] Cross-layer scheduling algorithm for real-time applications in wireless networks
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing 100876, China
    Ruan Jian Xue Bao, 2008, 1 (156-166):
  • [38] Using cross-layer design to detect jamming attacks in the CoNSIS scenario
    Dennisen, Dominik
    Abut, Fatih
    Glasel, Dennis
    Bogenfeld, Jurgen
    Barz, Christoph
    Aktas, Ismet
    Wehrle, Klaus
    Sevenich, Peter
    2013 Military Communications and Information Systems Conference, MCC 2013, 2013,
  • [39] Using Cross-Layer Design to detect Jamming Attacks in the CoNSIS Scenario
    Dennisen, Dominik
    Abut, Fatih
    Glaesel, Dennis
    Bogenfeld, Juergen
    Barz, Christoph
    Aktas, Ismet
    Wehrle, Klaus
    Sevenich, Peter
    2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
  • [40] A Cross Layer Framework to Mitigate a Joint MAC and Routing Attack in Multihop Wireless Networks
    Djahel, Soufiene
    Nait-Abdesselam, Farid
    Khokhar, Ashfaq
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 730 - +