Abstract
We investigate an understudied threat: networks of stealthy routers (S-Routers), communicating across a restricted area. S-Routers use short-range, low-energy communication, detectable only by nearby devices.
We examine algorithms to intercept S-Routers, using one or more mobile devices, called Interceptors. We focus on Destination-Search scenarios, in which the goal of the Interceptors is to find a (single) destination S-Router, by detecting transmissions along one or more paths from a given (single) source S-Router. We evaluate the algorithms analytically and experimentally (simulations), including against a parametric, optimized S-Routers algorithm.
Our main result is an Interceptors algorithm which bounds the expected time until the destination is found to \(O\left( \frac{N}{\hat{B}} \log ^2(N)\right) \), where \(N\) is the number of S-Routers and \(\hat{B}\) is the average rate of transmission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Herzberg, A., Ben Adar Bessos, M.: Intercepting a stealthy network - simulation demonstration (2018). https://sites.google.com/view/stealthynetinterception/home
Baisch, A.T., Ozcan, O., Goldberg, B., Wood, R.J.: High speed locomotion for a quadrupedal microrobot. Int. J. Robot. Res. 33(8), 1063–1082 (2014)
Herzberg, A., Ben Adar Bessos, M.: Intercepting a stealthy network. vixra.org/abs/1712.0510
Bobic, I.: Ted cruz wants police to ‘patrol and secure’ U.S. Muslim communities after brussels, March 2016. www.huffingtonpost.com. Accessed 21 Nov 2017
Bash, B.A., Goeckel, D., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)
Che, P.H., Bakshi, M., Jaggi, S.: Reliable deniable communication: hiding messages in noise. In: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2945–2949. IEEE (2013)
Chen, O., Meadows, C., Trivedi, G.: Stealthy protocols: metrics and open problems. In: Gibson-Robinson, T., Hopcroft, P., Lazić, R. (eds.) Concurrency, Security, and Puzzles. LNCS, vol. 10160, pp. 1–17. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-51046-0_1
Chen, X., Purohit, A., Pan, S., Ruiz, C., Han, J., Sun, Z., Mokaya, F., Tague, P., Zhang, P.: Design experiences in minimalistic flying sensor node platform through sensorfly. ACM Trans. Sensor Netw. (TOSN) 13(4), 33 (2017)
Das, G.K., Das, S., Nandy, S.C., Sinha, B.P.: Efficient algorithm for placing a given number of base stations to cover a convex region. J. Parallel Distrib. Comput. 66(11), 1353–1358 (2006)
Hu, J., Yan, S., Zhou, X., Shu, F., Wang, J.: Covert communication in wireless relay networks (2017). CoRR abs/1704.04946
Kershner, R.: The number of circles covering a set. Am. J. Math. 61(3), 665–671 (1939)
MacGregor, A.: Russian scientists create cockroach spy robot. thestack.com. Accessed 2 May 2018
Munkres, J.R.: Topology. Prentice Hall, Upper Saddle River (2000)
Rubenstein, M., Ahler, C., Nagpal, R.: Kilobot: a low cost scalable robot system for collective behaviors. In: 2012 IEEE International Conference on Robotics and Automation (ICRA), pp. 3293–3298. IEEE (2012)
Shabsigh, G.: Covert Communications in the RF Band of Primary Wireless Networks. Ph.D. thesis, University of Kansas (2017)
Sidahmed, M.: NYPD’s muslim surveillance violated regulations as recently as 2015: report, August 2016. www.theguardian.com. Accessed 21 Nov 2017
Bokareva, T., Hu, W., Kanhere, S.S., Jha, S.: Wireless sensor networks for battlefield surveillance. In: Proceedings of the Land Warfare Conference, pp. 1–8 (2006)
He, T., Krishnamurthy, S., Luo, L., Yan, T., Gu, L., Stoleru, R., Zhou, G., Cao, Q., Vicaire, P., Stankovic, J.A., Abdelzaher, T.F., Hui, J., Krogh, B.: VigilNet: an integrated sensor network system for energy-efficient surveillance. ACM Trans. Sensor Netw. (TOSN) 2(1), 1–38 (2006)
He, T., Vicaire, P., Cao, Q., Yan, T., Zhou, G., Gu, L., Luo, L., Stoleru, R., Stankovic, J.A., Abdelzaher, T.F.: Achieving long-term surveillance in vigilnet. Technical report. Department of Computer Science, Virginia Univ Charlottesville (2006)
Wang, L., Wornell, G.W., Zheng, L.: Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 62(6), 3493–3503 (2016)
Acknowledgments
This work is supported by the Israeli Ministry of Science and Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Ben Adar Bessos, M., Herzberg, A. (2018). Intercepting a Stealthy Network. In: Dinur, I., Dolev, S., Lodha, S. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2018. Lecture Notes in Computer Science(), vol 10879. Springer, Cham. https://doi.org/10.1007/978-3-319-94147-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-94147-9_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94146-2
Online ISBN: 978-3-319-94147-9
eBook Packages: Computer ScienceComputer Science (R0)