skip to main content
research-article

Intercepting a Stealthy Network

Published:12 March 2021Publication History
Skip Abstract Section

Abstract

We investigate an understudied threat: networks of stealthy routers (S-Routers), relaying messages to a hidden destination. The S-Routers relay communication along a path of multiple short-range, low-energy hops, to avoid remote localization by triangulation. Mobile devices called Interceptors can detect communication by an S-Router, but only when the Interceptor is next to the transmitting S-Router. We examine algorithms for a set of mobile Interceptors to find the destination of the communication relayed by the S-Routers. The algorithms are compared according to the number of communicating rounds before the destination is found, i.e., rounds in which data is transmitted from the source to the destination. We evaluate the algorithms analytically and using simulations, including against a parametric, optimized strategy for the S-Routers. Our main result is an Interceptors algorithm that bounds the expected number of communicating rounds by a term quasilinear in the number of S-Routers. For the case where S-Routers transmit at every round (“continuously”), we present an algorithm that improves this bound.

References

  1. Andrew T. Baisch, Onur Ozcan, Benjamin Goldberg, Daniel Ithier, and Robert J. Wood. 2014. High speed locomotion for a quadrupedal microrobot. Int. J. Robot. Res. 33, 8 (2014), 1063--1082.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mai Ben Adar Bessos and Amir Herzberg. 2019. Intercepting a stealthy network. Retrieved from https://researchgate.net.Google ScholarGoogle Scholar
  3. Mai Ben Adar Bessos and Amir Herzberg. 2019. Intercepting a stealthy network—Simulation demonstration. Retrieved from https://sites.google.com/view/stealthynetinterception.Google ScholarGoogle Scholar
  4. Mai Ben Adar Bessos and Amir Herzberg. 2019. Intercepting a stealthy network—Simulation implementation code. Retrieved from https://github.com/maiBessos/silenceOfTheBots/tree/master.Google ScholarGoogle Scholar
  5. Sourabh Bhattacharya and Tamer Başar. 2013. Dierential game-theoretic approach to a spatial jamming problem. In Advances in Dynamic Games, vol. 12. Springer, 245--268.Google ScholarGoogle Scholar
  6. Simon Birnbach, Richard Baker, and Ivan Martinovic. 2017. Wi-Fly?: Detecting privacy invasion attacks by consumer drones. In Proceedings of the Network and Distributed System Security Symposium (NDSS’17).Google ScholarGoogle ScholarCross RefCross Ref
  7. Igor Bobic. 2016. Ted Cruz Wants Police To “Patrol And Secure” U.S. Muslim Communities After Brussels. Retrieved from www.huffingtonpost.com.Google ScholarGoogle Scholar
  8. Tatiana Bokareva, Wen Hu, Salil Kanhere, Branko Ristic, Neil Gordon, Travis Bessell, Mark Rutten, and Sanjay Jha. 2006. Wireless sensor networks for battlefield surveillance. In Proceedings of the Land Warfare Conference. 1--8.Google ScholarGoogle Scholar
  9. Don Towsley, Boulat A. Bash, and Dennis Goeckel. 2015. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Commun. Mag. 53, 12 (2015), 26--31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pak Hou Che, Mayank Bakshi, and Sidharth Jaggi. 2013. Reliable deniable communication: Hiding messages in noise. In Proceedings of the IEEE International Symposium on Information Theory Proceedings (ISIT’13). IEEE, 2945--2949.Google ScholarGoogle ScholarCross RefCross Ref
  11. Olga Chen, Catherine A. Meadows, and Gautam Trivedi. 2017. Stealthy Protocols: Metrics and Open Problems.Springer, Cham. 1--17.Google ScholarGoogle Scholar
  12. Xinlei Chen, Aveek Purohit, Shijia Pan, Carlos Ruiz, Jun Han, Zheng Sun, Frank Mokaya, Patric Tague, and Pei Zhang. 2017. Design experiences in minimalistic flying sensor node platform through SensorFly. ACM Trans. Sensor Netw. 13, 4 (2017), 33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ricardo A. Collado and David Papp. 2012. Network Interdiction--Models, Applications, Unexplored Directions. Technical Report. Citeseer.Google ScholarGoogle Scholar
  14. Mauro Conti, Jeroen Willemsen, and Bruno Crispo. 2013. Providing source location privacy in wireless sensor networks: A survey. IEEE Commun. Surveys Tutor. 15, 3 (2013), 1238--1280.Google ScholarGoogle ScholarCross RefCross Ref
  15. Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium (SSYM’04). USENIX Association, Berkeley, CA, 21--21. Retrieved from http://dl.acm.org/citation.cfm?id=1251375.1251396.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Bennett Eisenberg. 2008. On the expectation of the maximum of IID geometric random variables. Stat. Probabil. Lett. 78, 2 (2008), 135--143.Google ScholarGoogle ScholarCross RefCross Ref
  17. Ronald L. Graham. 1994. Concrete Mathematics: A Foundation for Computer Science. Pearson Education India.Google ScholarGoogle Scholar
  18. Alexander Gutfraind. 2010. Optimizing topological cascade resilience based on the structure of terrorist networks. PloS One 5, 11 (2010), e13448.Google ScholarGoogle ScholarCross RefCross Ref
  19. Thomas C. Hales. 1998. An overview of the Kepler conjecture. Retrieved from https://arXiv:math/9811071.Google ScholarGoogle Scholar
  20. Tian He, Sudha Krishnamurthy, Liqian Luo, Ting Yan, Lin Gu, Radu Stoleru, Qing Zhou, Gang Cao, Pascal Vicaire, John A. Stankovic, and Tarek F. Abdelzaher. 2006. VigilNet: An integrated sensor network system for energy-efficient surveillance. ACM Trans. Sensor Netw. 2, 1 (2006), 1--38.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Tian He, Pascal Vicaire, Ting Yanand Qing Cao, Gang Zhou, Lin Gu, Liqian Luo, Radu Stoleru, John A. Stankovic, and Tarek F. Abdelzaher. 2006. Achieving Long-term Surveillance in Vigilnet. Technical Report. Department of Computer Science, Virginia University, Charlottesville, VA.Google ScholarGoogle Scholar
  22. Ryusuke Hohzaki. 2016. Search games: Literature and survey. J. Oper. Res. Soc. Japan 59, 1 (2016), 1--34.Google ScholarGoogle Scholar
  23. Jinsong Hu, Shihao Yan, Xiangyun Zhou, Feng Shu, and Jiangzhou Wang. 2017. Covert communication in wireless relay networks. CoRR abs/1704.04946.Google ScholarGoogle Scholar
  24. Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. 2000. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. 56--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Na Li, Nan Zhang, Sajal K. Das, and Bhavani Thuraisingham. 2009. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Netw. 7, 8 (2009), 1501--1514.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Roy Lindelauf, Peter Borm, and Herbert Hamers. 2009. The influence of secrecy on the communication structure of covert networks. Soc. Netw. 31, 2 (2009), 126--137.Google ScholarGoogle ScholarCross RefCross Ref
  27. Alice MacGregor. [n.d.]. RoboRoach: Russian Scientists Create Cockroach Robot Spy. Retrieved from sputniknews.com.Google ScholarGoogle Scholar
  28. Kiran Mehta, Donggang Liu, and Matthew Wright. 2007. Location privacy in sensor networks against a global eavesdropper. In Proceedings of the IEEE International Conference on Network Protocols (ICNP’07). IEEE, 314--323.Google ScholarGoogle ScholarCross RefCross Ref
  29. Nasrullah Memon, Jonathan David Farley, David L. Hicks, and Torben Rosenorn. 2009. Mathematical Methods in Counterterrorism. Springer Science & Business Media.Google ScholarGoogle Scholar
  30. James R. Munkres. 2000. Topology. Prentice Hall.Google ScholarGoogle Scholar
  31. Björn Muntwyler, Vincent Lenders, Franck Legendre, and Bernhard Plattner. 2012. Obfuscating IEEE 802.15. 4 communication using secret spreading codes. In Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS’12). IEEE, 1--8.Google ScholarGoogle Scholar
  32. Thanh H. Nguyen, Debarun Kar, Matthew Brown, Arunesh Sinha, Milind Tambe, and Albert Xin Jiang. 2016. Towards a science of security games. In New Frontiers of Multi-Disciplinary Research in STEAM-H.Google ScholarGoogle Scholar
  33. Christina Nunez. 2017. Your Old Cell Phone Can Help Save the Rain Forest. Retrieved from news.nationalgeographic.com.Google ScholarGoogle Scholar
  34. Michael Rubenstein, Christian Ahler, and Radhika Nagpal. 2012. Kilobot: A low cost scalable robot system for collective behaviors. In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA’12). IEEE, 3293--3298.Google ScholarGoogle ScholarCross RefCross Ref
  35. Cesar Santivanez and Jason Redi. 2003. On the use of directional antennas for sensor networks. In Proceedings of the Military Communications Conference (MILCOM’03), Vol. 1. IEEE, 670--675.Google ScholarGoogle ScholarCross RefCross Ref
  36. Ghaith Shabsigh. 2017. Covert Communications in the RF Band of Primary Wireless Networks. Ph.D. Dissertation. University of Kansas.Google ScholarGoogle Scholar
  37. Mazin Sidahmed. 2016. NYPD’s Muslim surveillance violated regulations as recently as 2015: report. Retrieved from www.theguardian.com.Google ScholarGoogle Scholar
  38. Marvin K. Simon, Jim K. Omura, Robert A. Scholtz, and Barry K. Levitt. 1994. Spread Spectrum Communications Handbook. McGraw-Hill, New York, NY.Google ScholarGoogle Scholar
  39. Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2020. I always feel like somebody’s sensing me! A framework to detect, identify, and localize clandestine wireless sensors. Retrieved from https://arXiv preprint arXiv:2005.03068.Google ScholarGoogle Scholar
  40. Ligong Wang, Gregory W. Wornell, and Lizhong Zheng. 2016. Fundamental limits of communication with low probability of detection. IEEE Trans. Info. Theory 62, 6 (2016), 3493--3503.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Intercepting a Stealthy Network

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Sensor Networks
          ACM Transactions on Sensor Networks  Volume 17, Issue 2
          May 2021
          296 pages
          ISSN:1550-4859
          EISSN:1550-4867
          DOI:10.1145/3447946
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 March 2021
          • Accepted: 1 October 2020
          • Revised: 1 August 2020
          • Received: 1 November 2019
          Published in tosn Volume 17, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed
        • Article Metrics

          • Downloads (Last 12 months)11
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format