This paper presents a novel specification-based investigation logic and applies it to tackle abuse of channel assignment protocols in multi-channel wireless networks. The investigation logic looks into malicious operations that violate the specification of channel assignment protocols. With logged operations, it reconstructs the process of channel assignment as an information flow that captures essential dependency relations among protocol-specific channel assignment operations. Then, it derives and applies reasoning rules to conduct consistency check over the logged operations and identify the source of abuse where the logged operations are inconsistent. Through simulation, the proposed investigation logic presents desired quality with zero false negative rate and very low false positive rate. © 2012 Springer-Verlag.
CITATION STYLE
Gu, Q., Jones, K., Zang, W., Yu, M., & Liu, P. (2012). Revealing abuses of channel assignment protocols in multi-channel wireless networks: An investigation logic approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 289–306). https://doi.org/10.1007/978-3-642-33167-1_17
Mendeley helps you to discover research relevant for your work.