Withdraw
Loading…
A clean slate approach to secure wireless networking
Ponniah, Jonathan
Loading…
Permalink
https://hdl.handle.net/2142/46565
Description
- Title
- A clean slate approach to secure wireless networking
- Author(s)
- Ponniah, Jonathan
- Issue Date
- 2014-01-16T17:54:12Z
- Director of Research (if dissertation) or Advisor (if thesis)
- Kumar, P.R.
- Doctoral Committee Chair(s)
- Kumar, P.R.
- Committee Member(s)
- Hu, Yih-Chun
- Vaidya, Nitin H.
- Srikant, Rayadurgam
- Department of Study
- Electrical & Computer Eng
- Discipline
- Electrical & Computer Engr
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- Ph.D.
- Degree Level
- Dissertation
- Keyword(s)
- Multi-hop wireless networks
- Utility maximization
- Game theory
- Security
- Secure clock synchronization
- Abstract
- Traditionally, wireless network protocols have been developed for performance. Subsequently, as attacks are identified, patches or defenses have been developed. This has led to an ``arms race,'' where one is never confident about what other vulnerabilities may be exposed in the future. We seek to reverse this process. We identify a set of axioms describing a model, under which we develop a secure utility optimized network. Our results rest on the axioms, and can be attacked only to the extent that the axioms can be challenged. We present a complete suite of protocols, taking a wireless network all the way from startup to optimality. These protocols are not just individually secure; they are holistically secure, that is, there are no gaps between them that can be attacked. The approach considers a group of wireless nodes some of which are ``good,'' and the rest, ``bad.'' The good nodes seek to form a functioning wireless network, operating at a high level of utility. The bad nodes know the identities of the good nodes but not conversely. Moreover, unlike their good counterparts, the bad nodes are capable of full centralized cooperation and collusion. On the other hand, the good nodes arrive on the scene unsynchronized, uncoordinated and ignorant of the others' intentions. We introduce a distributed protocol suite that enables the good nodes to proceed all the way from birth to a min-max utility optimal network, where the minimization is over all bad behaviors of the bad nodes, and the maximization is over all protocols followed by the good nodes. That is, the good nodes form a functioning, reliable network from startup, in the face of any sustained cooperative attack mounted by the bad nodes. We show that the protocol overhead occupies an arbitrarily small fraction of the total operating lifetime. We prove that our protocol realizes a nearly optimal level of utility. Our protocol supersedes a considerable amount of previous work that deals with several classes of attacks such as the following: man-in-the-middle, wormholes, dropping packets, Byzantine behaviors, disruption of timing events, presenting false topologies, etc. More importantly, this protocol suite obviates the need to identify all of the other types attacks that can potentially be carried out by colluding malicious nodes, for there are many. Instead, under this protocol, the malicious nodes cannot reduce the utility of the network any further than they could by either just jamming and/or cooperating with the protocol. At a broader level, our approach presents a model-based approach to secure protocol development, as an alternative to an arms race type of approach.
- Graduation Semester
- 2013-12
- Permalink
- http://hdl.handle.net/2142/46565
- Copyright and License Information
- Copyright 2013 Jonathan Ponniah
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisDissertations and Theses - Electrical and Computer Engineering
Dissertations and Theses in Electrical and Computer EngineeringManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…