Modeling adaptive node capture attacks in multi-hop wireless networks

  • Authors:
  • Patrick Tague;Radha Poovendran

  • Affiliations:
  • Network Security Lab (NSL), Department of Electrical Engineering, University of Washington, PAC AE100R, Campus Box 352500, Seattle, WA 98195-2500, United States;Network Security Lab (NSL), Department of Electrical Engineering, University of Washington, PAC AE100R, Campus Box 352500, Seattle, WA 98195-2500, United States

  • Venue:
  • Ad Hoc Networks
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev-Yao model are known to be unsuitable for describing node capture attacks. By defining the amortized initialization overhead cost as well as the cost of capturing a node, we show that finding the node capture attack yielding the minimum cost can be formulated as an integer-programming minimization problem. Hence, there is no polynomial solution to find the minimum cost node capture attack. We show that depending on the adversary's knowledge of the constraint matrix in the integer-programming problem, different greedy heuristics can be developed for node capture attacks. We also show under what conditions privacy-preserving key establishment protocols can help to prevent minimum cost node capture attacks. Individual node storage randomization is investigated as a technique to mitigate the effect of attacks which are not prevented by the use of privacy-preserving protocols. It is shown that probabilistic heuristic attacks can be performed effectively even under storage randomization.