Skip to main content

Intercepting a Stealthy Network

  • Conference paper
  • First Online:
Cyber Security Cryptography and Machine Learning (CSCML 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10879))

Abstract

We investigate an understudied threat: networks of stealthy routers (S-Routers), communicating across a restricted area. S-Routers use short-range, low-energy communication, detectable only by nearby devices.

We examine algorithms to intercept S-Routers, using one or more mobile devices, called Interceptors. We focus on Destination-Search scenarios, in which the goal of the Interceptors is to find a (single) destination S-Router, by detecting transmissions along one or more paths from a given (single) source S-Router. We evaluate the algorithms analytically and experimentally (simulations), including against a parametric, optimized S-Routers algorithm.

Our main result is an Interceptors algorithm which bounds the expected time until the destination is found to \(O\left( \frac{N}{\hat{B}} \log ^2(N)\right) \), where \(N\) is the number of S-Routers and \(\hat{B}\) is the average rate of transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Herzberg, A., Ben Adar Bessos, M.: Intercepting a stealthy network - simulation demonstration (2018). https://sites.google.com/view/stealthynetinterception/home

  2. Baisch, A.T., Ozcan, O., Goldberg, B., Wood, R.J.: High speed locomotion for a quadrupedal microrobot. Int. J. Robot. Res. 33(8), 1063–1082 (2014)

    Article  Google Scholar 

  3. Herzberg, A., Ben Adar Bessos, M.: Intercepting a stealthy network. vixra.org/abs/1712.0510

    Google Scholar 

  4. Bobic, I.: Ted cruz wants police to ‘patrol and secure’ U.S. Muslim communities after brussels, March 2016. www.huffingtonpost.com. Accessed 21 Nov 2017

  5. Bash, B.A., Goeckel, D., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)

    Article  Google Scholar 

  6. Che, P.H., Bakshi, M., Jaggi, S.: Reliable deniable communication: hiding messages in noise. In: 2013 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2945–2949. IEEE (2013)

    Google Scholar 

  7. Chen, O., Meadows, C., Trivedi, G.: Stealthy protocols: metrics and open problems. In: Gibson-Robinson, T., Hopcroft, P., Lazić, R. (eds.) Concurrency, Security, and Puzzles. LNCS, vol. 10160, pp. 1–17. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-51046-0_1

    Chapter  Google Scholar 

  8. Chen, X., Purohit, A., Pan, S., Ruiz, C., Han, J., Sun, Z., Mokaya, F., Tague, P., Zhang, P.: Design experiences in minimalistic flying sensor node platform through sensorfly. ACM Trans. Sensor Netw. (TOSN) 13(4), 33 (2017)

    Google Scholar 

  9. Das, G.K., Das, S., Nandy, S.C., Sinha, B.P.: Efficient algorithm for placing a given number of base stations to cover a convex region. J. Parallel Distrib. Comput. 66(11), 1353–1358 (2006)

    Article  Google Scholar 

  10. Hu, J., Yan, S., Zhou, X., Shu, F., Wang, J.: Covert communication in wireless relay networks (2017). CoRR abs/1704.04946

    Google Scholar 

  11. Kershner, R.: The number of circles covering a set. Am. J. Math. 61(3), 665–671 (1939)

    Article  MathSciNet  Google Scholar 

  12. MacGregor, A.: Russian scientists create cockroach spy robot. thestack.com. Accessed 2 May 2018

  13. Munkres, J.R.: Topology. Prentice Hall, Upper Saddle River (2000)

    MATH  Google Scholar 

  14. Rubenstein, M., Ahler, C., Nagpal, R.: Kilobot: a low cost scalable robot system for collective behaviors. In: 2012 IEEE International Conference on Robotics and Automation (ICRA), pp. 3293–3298. IEEE (2012)

    Google Scholar 

  15. Shabsigh, G.: Covert Communications in the RF Band of Primary Wireless Networks. Ph.D. thesis, University of Kansas (2017)

    Google Scholar 

  16. Sidahmed, M.: NYPD’s muslim surveillance violated regulations as recently as 2015: report, August 2016. www.theguardian.com. Accessed 21 Nov 2017

  17. Bokareva, T., Hu, W., Kanhere, S.S., Jha, S.: Wireless sensor networks for battlefield surveillance. In: Proceedings of the Land Warfare Conference, pp. 1–8 (2006)

    Google Scholar 

  18. He, T., Krishnamurthy, S., Luo, L., Yan, T., Gu, L., Stoleru, R., Zhou, G., Cao, Q., Vicaire, P., Stankovic, J.A., Abdelzaher, T.F., Hui, J., Krogh, B.: VigilNet: an integrated sensor network system for energy-efficient surveillance. ACM Trans. Sensor Netw. (TOSN) 2(1), 1–38 (2006)

    Article  Google Scholar 

  19. He, T., Vicaire, P., Cao, Q., Yan, T., Zhou, G., Gu, L., Luo, L., Stoleru, R., Stankovic, J.A., Abdelzaher, T.F.: Achieving long-term surveillance in vigilnet. Technical report. Department of Computer Science, Virginia Univ Charlottesville (2006)

    Google Scholar 

  20. Wang, L., Wornell, G.W., Zheng, L.: Fundamental limits of communication with low probability of detection. IEEE Trans. Inf. Theory 62(6), 3493–3503 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work is supported by the Israeli Ministry of Science and Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mai Ben Adar Bessos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ben Adar Bessos, M., Herzberg, A. (2018). Intercepting a Stealthy Network. In: Dinur, I., Dolev, S., Lodha, S. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2018. Lecture Notes in Computer Science(), vol 10879. Springer, Cham. https://doi.org/10.1007/978-3-319-94147-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94147-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94146-2

  • Online ISBN: 978-3-319-94147-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics