A proactive and deceptive perspective for role detection and concealment in wireless networks

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles of nodes are nonhomogeneous; i.e., they are not equally important. This, however, opens a door for an adversary to target important nodes in the network by identifying their roles. In this chapter, we focus on investigating an important open question: how to detect and conceal the roles of nodes in wireless networks? Answers to this question are of essential importance to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis and simulations that it is feasible and even accurate to identify critical roles of nodes by looking at network traffic patterns. To provide countermeasures against role detection, we propose role concealment methods based on proactive and deceptive network strategies. We use simulations to evaluate the effectiveness and costs of the role concealment methods.

Cite

CITATION STYLE

APA

Lu, Z., Wang, C., & Wei, M. (2016). A proactive and deceptive perspective for role detection and concealment in wireless networks. In Cyber Deception: Building the Scientific Foundation (pp. 97–114). Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free