Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

European Symposium on Research in Computer Security

ESORICS 2012: Computer Security – ESORICS 2012 pp 289–306Cite as

  1. Home
  2. Computer Security – ESORICS 2012
  3. Conference paper
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach

Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach

  • Qijun Gu19,
  • Kyle Jones19,
  • Wanyu Zang20,
  • Meng Yu20 &
  • …
  • Peng Liu21 
  • Conference paper
  • 3478 Accesses

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7459)

Abstract

This paper presents a novel specification-based investigation logic and applies it to tackle abuse of channel assignment protocols in multi-channel wireless networks. The investigation logic looks into malicious operations that violate the specification of channel assignment protocols. With logged operations, it reconstructs the process of channel assignment as an information flow that captures essential dependency relations among protocol-specific channel assignment operations. Then, it derives and applies reasoning rules to conduct consistency check over the logged operations and identify the source of abuse where the logged operations are inconsistent. Through simulation, the proposed investigation logic presents desired quality with zero false negative rate and very low false positive rate.

Keywords

  • Intrusion Detection
  • Channel Assignment
  • Investigation Logic
  • Security Protocol
  • Wireless Mesh Network

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. INET, http://inet.omnetpp.org/

  2. Alicherry, M., Bhatia, R., Li, L.E.: Joint channel assignment and routing for throughput optimization in multi-radio wireless mesh networks. In: Proc. of ACM MobiCom, pp. 58–72 (2005)

    Google Scholar 

  3. Bicket, J., Aguayo, D., Biswas, S., Morris, R.: Architecture and evaluation of an unplanned 802.11b mesh network. In: Proc. of ACM Mobicom, pp. 31–42 (2005)

    Google Scholar 

  4. Boreale, M., Buscemi, M.G.: A method for symbolic analysis of security protocols. Theor. Comput. Sci. 338(1-3), 393–425 (2005)

    CrossRef  MathSciNet  MATH  Google Scholar 

  5. Chereddi, C., Kyasanur, P., Vaidya, N.H.: Design and implementation of a multi-channel multi-interface network. In: Proc. of International Workshop on Multi-Hop Ad Hoc Networks: from Theory to Reality, pp. 23–30 (2006)

    Google Scholar 

  6. Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu, K., BBlaze, M.: Why (special agent) Johnny (still) can’t encrypt: a security analysis of the APCO project 25 two-way radio system. In: Proc. of USENIX Security (2011)

    Google Scholar 

  7. Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (pcl). Electr. Notes Theor. Comput. Sci. 172, 311–358 (2007)

    CrossRef  MathSciNet  Google Scholar 

  8. Dhananjay, A., Zhang, H., Li, J., Subramanian, L.: Practical, distributed channel assignment and routing in dual-radio mesh networks. In: Proc. of ACM SIGCOMM, vol. 39, pp. 99–110 (2009)

    Google Scholar 

  9. Ferreira, E.W.T., de Oliveira, R., Carrijo, G.A., Bhargava, B.: Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach. In: Proc. of IEEE International Conference on Distributed Computing Systems Workshops, pp. 451–454 (2009)

    Google Scholar 

  10. Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: SASN, pp. 66–77 (2004)

    Google Scholar 

  11. Gu, Q., Yu, M., Zang, W., Liu, P.: Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks. In: Proc. of IEEE ICC (2011)

    Google Scholar 

  12. Helman, P., Liepins, G.: Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse. IEEE Transaction on Software Engeering 19(9), 886–901 (1993)

    CrossRef  Google Scholar 

  13. Jagadeesan, R., Jeffrey, A., Pitcher, C., Riely, J.: Towards a Theory of Accountability and Audit. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 152–167. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  14. Kim, H., Gu, Q., Yu, M., Zang, W., Liu, P.: A Simulation Framework for Performance Analysis of Multi-Interface and Multi-Channel Wireless Networks in INET/OMNET++. In: Proc. of Communications and Networking Simulation Symposium (2010)

    Google Scholar 

  15. Kyasanur, P., Vaidya, N.H.: Routing and link-layer protocols for multi-channel multi-interface ad hoc wireless networks. SIGMOBILE Mob. Comput. Commun. Rev. 10(1), 31–43 (2006)

    CrossRef  Google Scholar 

  16. Lin, X., Rasool, S.: A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad Hoc Wireless Networks. In: Proc. of IEEE INFOCOM, pp. 1118–1126 (2007)

    Google Scholar 

  17. Lincoln, P., Mitchell, J.C., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: ACM Conference on Computer and Communications Security, pp. 112–121 (1998)

    Google Scholar 

  18. Martignon, F., Paris, S., Capone, A.: Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks. Computer Networks 53(12), 2192–2207 (2009)

    CrossRef  MATH  Google Scholar 

  19. Mitchell, J.C.: Finite-State Analysis of Security Protocols. In: Vardi, M.Y. (ed.) CAV 1998. LNCS, vol. 1427, pp. 71–76. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  20. Mitchell, J.C.: Security analysis of network protocols: logical and computational methods. In: PPDP, pp. 151–152 (2005)

    Google Scholar 

  21. Naveed, A., Kanhere, S.S.: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks. In: Proc. of IEEE GLOBECOM, pp. 1–5 (2006)

    Google Scholar 

  22. Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: ACM Conference on Computer and Communications Security, pp. 336–345 (2006)

    Google Scholar 

  23. Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: A logic-based network security analyzer. In: 14th USENIX Security Symposium (2005)

    Google Scholar 

  24. Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: SWATT: SoftWare-based ATTestation for Embedded Devices. In: Proc. of IEEE Symposium on Security and Privacy, pp. 272–284 (2004)

    Google Scholar 

  25. Shin, D.-H., Bagchi, S.: Optimal monitoring in multi-channel multi-radio wireless mesh networks. In: Proc. of ACM MobiHoc, pp. 229–238 (2009)

    Google Scholar 

  26. Song, H., Xie, L., Zhu, S., Cao, G.: Sensor node compromise detection: the location perspective. In: IWCMC, pp. 242–247 (2007)

    Google Scholar 

  27. Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: INFOCOM (2006)

    Google Scholar 

  28. Xing, K., Cheng, X., Ma, L., Liang, Q.: Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks. In: Proc. of ACM MobiCom, pp. 15–26 (2007)

    Google Scholar 

  29. Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed software-based attestation for node compromise detection in sensor networks. In: SRDS, pp. 219–230 (2007)

    Google Scholar 

  30. Zang, W., Gu, Q., Yu, M., Liu, P.: An attack-resilient channel assignment mac protocol. In: NBiS, pp. 246–253 (2009)

    Google Scholar 

  31. Zhu, H., Lin, X., Lu, R., Ho, P.-H., Shen, X.: SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Transactions on Wireless Communications 7(10), 3858–3868 (2008)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Texas State University, San Marcos, TX, 78666, USA

    Qijun Gu & Kyle Jones

  2. Virginia Commonwealth University, Richmond, VA, 23284, USA

    Wanyu Zang & Meng Yu

  3. Pennsylvania State University, University Park, PA, 16802, USA

    Peng Liu

Authors
  1. Qijun Gu
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Kyle Jones
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Wanyu Zang
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Meng Yu
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Peng Liu
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Informatica, Università degli Studi di Milano, Via Bramante 65, 26013, Crema, Italy

    Sara Foresti

  2. Computer Science Department, Columbia University, 1214 Amsterdam Avenue, 10025, New York, NY, US

    Moti Yung

  3. Institute of Informatics and Telematics, Information Security Group, National Research Council, Pisa Research Area, Via G. Moruzzi 1, 56125, Pisa, Italy

    Fabio Martinelli

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gu, Q., Jones, K., Zang, W., Yu, M., Liu, P. (2012). Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. In: Foresti, S., Yung, M., Martinelli, F. (eds) Computer Security – ESORICS 2012. ESORICS 2012. Lecture Notes in Computer Science, vol 7459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33167-1_17

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-33167-1_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33166-4

  • Online ISBN: 978-3-642-33167-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature