Abstract
We investigate an understudied threat: networks of stealthy routers (S-Routers), relaying messages to a hidden destination. The S-Routers relay communication along a path of multiple short-range, low-energy hops, to avoid remote localization by triangulation. Mobile devices called Interceptors can detect communication by an S-Router, but only when the Interceptor is next to the transmitting S-Router. We examine algorithms for a set of mobile Interceptors to find the destination of the communication relayed by the S-Routers. The algorithms are compared according to the number of communicating rounds before the destination is found, i.e., rounds in which data is transmitted from the source to the destination. We evaluate the algorithms analytically and using simulations, including against a parametric, optimized strategy for the S-Routers. Our main result is an Interceptors algorithm that bounds the expected number of communicating rounds by a term quasilinear in the number of S-Routers. For the case where S-Routers transmit at every round (“continuously”), we present an algorithm that improves this bound.
- Andrew T. Baisch, Onur Ozcan, Benjamin Goldberg, Daniel Ithier, and Robert J. Wood. 2014. High speed locomotion for a quadrupedal microrobot. Int. J. Robot. Res. 33, 8 (2014), 1063--1082.Google ScholarDigital Library
- Mai Ben Adar Bessos and Amir Herzberg. 2019. Intercepting a stealthy network. Retrieved from https://researchgate.net.Google Scholar
- Mai Ben Adar Bessos and Amir Herzberg. 2019. Intercepting a stealthy network—Simulation demonstration. Retrieved from https://sites.google.com/view/stealthynetinterception.Google Scholar
- Mai Ben Adar Bessos and Amir Herzberg. 2019. Intercepting a stealthy network—Simulation implementation code. Retrieved from https://github.com/maiBessos/silenceOfTheBots/tree/master.Google Scholar
- Sourabh Bhattacharya and Tamer Başar. 2013. Dierential game-theoretic approach to a spatial jamming problem. In Advances in Dynamic Games, vol. 12. Springer, 245--268.Google Scholar
- Simon Birnbach, Richard Baker, and Ivan Martinovic. 2017. Wi-Fly?: Detecting privacy invasion attacks by consumer drones. In Proceedings of the Network and Distributed System Security Symposium (NDSS’17).Google ScholarCross Ref
- Igor Bobic. 2016. Ted Cruz Wants Police To “Patrol And Secure” U.S. Muslim Communities After Brussels. Retrieved from www.huffingtonpost.com.Google Scholar
- Tatiana Bokareva, Wen Hu, Salil Kanhere, Branko Ristic, Neil Gordon, Travis Bessell, Mark Rutten, and Sanjay Jha. 2006. Wireless sensor networks for battlefield surveillance. In Proceedings of the Land Warfare Conference. 1--8.Google Scholar
- Don Towsley, Boulat A. Bash, and Dennis Goeckel. 2015. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 53, 12 (2015), 26--31.Google ScholarDigital Library
- Pak Hou Che, Mayank Bakshi, and Sidharth Jaggi. 2013. Reliable deniable communication: Hiding messages in noise. In Proceedings of the IEEE International Symposium on Information Theory Proceedings (ISIT’13). IEEE, 2945--2949.Google ScholarCross Ref
- Olga Chen, Catherine A. Meadows, and Gautam Trivedi. 2017. Stealthy Protocols: Metrics and Open Problems.Springer, Cham. 1--17.Google Scholar
- Xinlei Chen, Aveek Purohit, Shijia Pan, Carlos Ruiz, Jun Han, Zheng Sun, Frank Mokaya, Patric Tague, and Pei Zhang. 2017. Design experiences in minimalistic flying sensor node platform through SensorFly. ACM Trans. Sensor Netw. 13, 4 (2017), 33.Google ScholarDigital Library
- Ricardo A. Collado and David Papp. 2012. Network Interdiction--Models, Applications, Unexplored Directions. Technical Report. Citeseer.Google Scholar
- Mauro Conti, Jeroen Willemsen, and Bruno Crispo. 2013. Providing source location privacy in wireless sensor networks: A survey. IEEE Commun. Surveys Tutor. 15, 3 (2013), 1238--1280.Google ScholarCross Ref
- Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium (SSYM’04). USENIX Association, Berkeley, CA, 21--21. Retrieved from http://dl.acm.org/citation.cfm?id=1251375.1251396.Google ScholarDigital Library
- Bennett Eisenberg. 2008. On the expectation of the maximum of IID geometric random variables. Stat. Probabil. Lett. 78, 2 (2008), 135--143.Google ScholarCross Ref
- Ronald L. Graham. 1994. Concrete Mathematics: A Foundation for Computer Science. Pearson Education India.Google Scholar
- Alexander Gutfraind. 2010. Optimizing topological cascade resilience based on the structure of terrorist networks. PloS One 5, 11 (2010), e13448.Google ScholarCross Ref
- Thomas C. Hales. 1998. An overview of the Kepler conjecture. Retrieved from https://arXiv:math/9811071.Google Scholar
- Tian He, Sudha Krishnamurthy, Liqian Luo, Ting Yan, Lin Gu, Radu Stoleru, Qing Zhou, Gang Cao, Pascal Vicaire, John A. Stankovic, and Tarek F. Abdelzaher. 2006. VigilNet: An integrated sensor network system for energy-efficient surveillance. ACM Trans. Sensor Netw. 2, 1 (2006), 1--38.Google ScholarDigital Library
- Tian He, Pascal Vicaire, Ting Yanand Qing Cao, Gang Zhou, Lin Gu, Liqian Luo, Radu Stoleru, John A. Stankovic, and Tarek F. Abdelzaher. 2006. Achieving Long-term Surveillance in Vigilnet. Technical Report. Department of Computer Science, Virginia University, Charlottesville, VA.Google Scholar
- Ryusuke Hohzaki. 2016. Search games: Literature and survey. J. Oper. Res. Soc. Japan 59, 1 (2016), 1--34.Google Scholar
- Jinsong Hu, Shihao Yan, Xiangyun Zhou, Feng Shu, and Jiangzhou Wang. 2017. Covert communication in wireless relay networks. CoRR abs/1704.04946.Google Scholar
- Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. 2000. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. 56--67.Google ScholarDigital Library
- Na Li, Nan Zhang, Sajal K. Das, and Bhavani Thuraisingham. 2009. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Netw. 7, 8 (2009), 1501--1514.Google ScholarDigital Library
- Roy Lindelauf, Peter Borm, and Herbert Hamers. 2009. The influence of secrecy on the communication structure of covert networks. Soc. Netw. 31, 2 (2009), 126--137.Google ScholarCross Ref
- Alice MacGregor. [n.d.]. RoboRoach: Russian Scientists Create Cockroach Robot Spy. Retrieved from sputniknews.com.Google Scholar
- Kiran Mehta, Donggang Liu, and Matthew Wright. 2007. Location privacy in sensor networks against a global eavesdropper. In Proceedings of the IEEE International Conference on Network Protocols (ICNP’07). IEEE, 314--323.Google ScholarCross Ref
- Nasrullah Memon, Jonathan David Farley, David L. Hicks, and Torben Rosenorn. 2009. Mathematical Methods in Counterterrorism. Springer Science & Business Media.Google Scholar
- James R. Munkres. 2000. Topology. Prentice Hall.Google Scholar
- Björn Muntwyler, Vincent Lenders, Franck Legendre, and Bernhard Plattner. 2012. Obfuscating IEEE 802.15. 4 communication using secret spreading codes. In Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS’12). IEEE, 1--8.Google Scholar
- Thanh H. Nguyen, Debarun Kar, Matthew Brown, Arunesh Sinha, Milind Tambe, and Albert Xin Jiang. 2016. Towards a science of security games. In New Frontiers of Multi-Disciplinary Research in STEAM-H.Google Scholar
- Christina Nunez. 2017. Your Old Cell Phone Can Help Save the Rain Forest. Retrieved from news.nationalgeographic.com.Google Scholar
- Michael Rubenstein, Christian Ahler, and Radhika Nagpal. 2012. Kilobot: A low cost scalable robot system for collective behaviors. In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA’12). IEEE, 3293--3298.Google ScholarCross Ref
- Cesar Santivanez and Jason Redi. 2003. On the use of directional antennas for sensor networks. In Proceedings of the Military Communications Conference (MILCOM’03), Vol. 1. IEEE, 670--675.Google ScholarCross Ref
- Ghaith Shabsigh. 2017. Covert Communications in the RF Band of Primary Wireless Networks. Ph.D. Dissertation. University of Kansas.Google Scholar
- Mazin Sidahmed. 2016. NYPD’s Muslim surveillance violated regulations as recently as 2015: report. Retrieved from www.theguardian.com.Google Scholar
- Marvin K. Simon, Jim K. Omura, Robert A. Scholtz, and Barry K. Levitt. 1994. Spread Spectrum Communications Handbook. McGraw-Hill, New York, NY.Google Scholar
- Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2020. I always feel like somebody’s sensing me! A framework to detect, identify, and localize clandestine wireless sensors. Retrieved from https://arXiv preprint arXiv:2005.03068.Google Scholar
- Ligong Wang, Gregory W. Wornell, and Lizhong Zheng. 2016. Fundamental limits of communication with low probability of detection. IEEE Trans. Info. Theory 62, 6 (2016), 3493--3503.Google ScholarDigital Library
Index Terms
- Intercepting a Stealthy Network
Recommendations
Intercepting a Stealthy Network
Cyber Security Cryptography and Machine LearningAbstractWe investigate an understudied threat: networks of stealthy routers (S-Routers), communicating across a restricted area. S-Routers use short-range, low-energy communication, detectable only by nearby devices.
We examine algorithms to intercept S-...
Causality reasoning about network events for detecting stealthy malware activities
Malicious software activities have become more and more clandestine, making them challenging to detect. Existing security solutions rely heavily on the recognition of known code or behavior signatures, which are incapable of detecting new malware ...
A behaviour study of network-aware stealthy worms
ICC'09: Proceedings of the 2009 IEEE international conference on CommunicationsThis paper examines the general behaviour of stealthy worms. In particular, we focus on worms that are designed based on network awareness. We study the case where a worm, instead of aiming to spread as fast as possible and penetrate Intrustion ...
Comments