On the Optimal Allocation of Adversarial Resources
2012 (English)In: Mobicom'12 The 18th Annual International Conference on Mobile Computing and Networking: Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking / [ed] ACM, Association for Computing Machinery (ACM), 2012, 33-38 p.Conference paper (Refereed)
Security is important for mission-critical wireless sensor net-works (WSNs). This is especially so because powerful ad-versaries could compromise and control a significant frac-tion of the network nodes. A plethora of schemes has beendeveloped to secure wireless sensor networks and resilienceto sophisticated attacks has been analyzed. However, thequestion of how the adversary could deploy her resources tomaximally affect the attacked system has remained largelyunaddressed. This is the problem this paper is concernedwith: Given a number of compromised entities (nodes) andcryptographic keys, how can the adversary devise a close-to-optimal attack tactic? To the best of our knowledge, this isthe first investigation of its kind: while the basic adversarialbehavior is well-known, the problem of how the adversarycan optimally deploy her resources to maximize the attackimpact has not been considered for WSNs. We consideran abstract model of the mission-critical WSN and the ad-versary, and we find that the determination of an optimalattack is computationally hard, thus, we devise an efficientheuristic approach. An intelligent adversarial resource allo-cation indeed yields disproportional gains for the attacker.Our analysis is the first necessary step to comprehend howto best address vulnerabilities.
Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2012. 33-38 p.
Adversary modeling, security analysis, resource allocation
IdentifiersURN: urn:nbn:se:kth:diva-107756DOI: 10.1145/2348656.2348666ScopusID: 2-s2.0-84866614743ISBN: 978-1-4503-1529-6OAI: oai:DiVA.org:kth-107756DiVA: diva2:577912
Conference on Mobile Computing and Networking Istanbul, Turkey, August 26, 2012
FunderICT - The Next Generation
© ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Mobicom'12 The 18th Annual International Conference on Mobile Computing and Networking, http://doi.acm.org/10.1145/2348656.2348666
QC 201301102013-01-102012-12-172016-01-29Bibliographically approved