A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking
From MaRDI portal
Publication:5358498
DOI10.1109/TCNS.2015.2428309zbMATH Open1370.94539arXiv1309.2904OpenAlexW2085361544MaRDI QIDQ5358498FDOQ5358498
Authors: Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar
Publication date: 21 September 2017
Published in: IEEE Transactions on Control of Network Systems (Search for Journal in Brave)
Abstract: Traditionally, wireless network protocols have been designed for performance. Subsequently, as attacks have been identified, patches have been developed. This has resulted in an "arms race" development process of discovering vulnerabilities and then patching them. The fundamental difficulty with this approach is that other vulnerabilities may still exist. No provable security or performance guarantees can ever be provided. We develop a system-theoretic approach to security that provides a complete protocol suite with provable guarantees, as well as proof of min-max optimality with respect to any given utility function of source-destination rates. Our approach is based on a model capturing the essential features of an adhoc wireless network that has been infiltrated with hostile nodes. We consider any collection of nodes, some good and some bad, possessing specified capabilities vis-a-vis cryptography, wireless communication and clocks. The good nodes do not know the bad nodes. The bad nodes can collaborate perfectly, and are capable of any disruptive acts ranging from simply jamming to non-cooperation with the protocols in any manner they please. The protocol suite caters to the complete life-cycle, all the way from birth of nodes, through all phases of ad hoc network formation, leading to an optimized network carrying data reliably. It provably achieves the min-max of the utility function, where the max is over all protocol suites published and followed by the good nodes, while the min is over all Byzantine behaviors of the bad nodes. Under the protocol suite, the bad nodes do not benefit from any actions other than jamming or cooperating. This approach supersedes much previous work that deals with several types of attacks.
Full work available at URL: https://arxiv.org/abs/1309.2904
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Network protocols (68M12)
Cited In (1)
This page was built for publication: A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5358498)