In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles of nodes are nonhomogeneous; i.e., they are not equally important. This, however, opens a door for an adversary to target important nodes in the network by identifying their roles. In this chapter, we focus on investigating an important open question: how to detect and conceal the roles of nodes in wireless networks? Answers to this question are of essential importance to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis and simulations that it is feasible and even accurate to identify critical roles of nodes by looking at network traffic patterns. To provide countermeasures against role detection, we propose role concealment methods based on proactive and deceptive network strategies. We use simulations to evaluate the effectiveness and costs of the role concealment methods.
CITATION STYLE
Lu, Z., Wang, C., & Wei, M. (2016). A proactive and deceptive perspective for role detection and concealment in wireless networks. In Cyber Deception: Building the Scientific Foundation (pp. 97–114). Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_5
Mendeley helps you to discover research relevant for your work.