
On Detection and Concealment of Critical Roles in Tactical Wireless Networks Zhuo Lu Cliff Wang Mingkui Wei University of Memphis, Army Research Office, NC State University, Email: [email protected]. Email: [email protected]. Email: [email protected]. Abstract—In tactical wireless networks, the one-to-multiple commands to others, but indicates that it is actively interacting communication model is pervasive due to commanding and with others, thereby playing an important role in the network control requirements in mission operations. In such networks, by definition. Accordingly, the problem becomes two-fold: 1) the roles of nodes are non-homogeneous; i.e., they are not equally important. This, however, opens a door for an adversary the role detection problem, i.e., whether we can accurately to target important nodes in the network by identifying their identify such critical commanding nodes in a network from roles. In this paper, we investigate an important open question: an adversary’s point of view; and 2) the role concealment how to detect and conceal the roles of nodes in tactical wireless problem, i.e., whether we can protect such nodes from being networks? Answers to this question are of essential importance identified from a defender’s points of view. to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis The role detection and concealment problems seem to be an and simulations that it is feasible and even accurate to identify endless arms race. As both role detection and concealment are critical roles of nodes by looking at network traffic patterns. To not well investigated in the literature, in this paper, we attempt provide countermeasures against role detection, we propose role to provide an initial study on both problems. More specifically, concealment methods based on proactive network strategies. We we first show that network flow analysis [8]–[15] servers as a use simulations to evaluate the effectiveness and costs of the role concealment methods. foundation for role detection, based on which we develop our role detection method. Simulation results demonstrate that it is I. INTRODUCTION quite feasible and accurate to identify the roles of command- Tactical wireless networks [1]–[3] are mission-critical mo- ing nodes. These nodes can become an adversary’s primary bile ad-hoc networks that involve unique challenges due to targets, thus must be protected by role concealment methods. tactical requirements, such as reliability and security in hostile Accordingly, we propose a line of network strategies, which environments. Tactical wireless networks are envisioned to proactively cause network traffic dynamics to counter network provide the most effective solutions to cyber dominance for flow analysis based role detection. We also use simulations to networked warfighters. evaluate the performance and cost of such proactive strategies. In tactical wireless networks, the roles of nodes are non- Our contributions are two-fold: 1) we provide an initial homogenous; i.e., they are not equally important. For example study on role detection and concealment, which are important [4], Intelligence, surveillance, and reconnaissance (ISR) opera- in tactical wireless networks; 2) we propose role detection tions are used to collect operational information, such as status and concealment methods and comprehensively evaluate their of the enemy, terrain, and weather. Such information will be performance. Our initial work demonstrates that it is vital to delivered to the commander, who will make the best judgement be proactive to protect critical nodes from being identified and to task ISR assets and soldiers. Therefore, commanding and becoming primary targets in tactical wireless networks. control roles are pervasive in tactical wireless networks. At The rest of this paper is organized as follows. In Sec- the network level, such roles lead to the one-to-multiple com- tion II, we introduce models and state the problem. In Sec- munication model in the network, which is usually facilitated tions III and IV, we present our findings in role detection and by either unicast or multicast protocols [5]–[7]. concealment, respectively. Finally, we conclude in Section V. In this paper, we investigate an important question: how II. MODELS AND PROBLEM STATEMENT to detect and conceal the roles of nodes in tactical wireless networks? This question has not been well explored in the In this section, we introduce models and state the problems literature, but is of essential importance. In particular, we say of role detection and concealment. Notations: We denote by T Rn×m that a node has a commanding role in a tactical network if the A the transpose of matrix A. We use to represent the number of its active network flows with other nodes exceeds set of all n-by-m real-valued matrices. a given threshold and say that it has an acting role otherwise. A. Network Model and Roles of Nodes In this paper, the concept of a node being commanding does not necessarily mean that the node is sending real operational We consider a tactical wireless network with n nodes (indexed by N = {1, 2, · · · ,n}) distributed independently and This research in this paper is supported by NSF CNS-1464114. uniformly on region Ω=[0, n/λ]2 for a large node density p λ such that the network is connected (asymptotically almost Definition 3 (Role Concealment): The goal of the network surely) [16]. We say two nodes have a network link if they defender is to make the real role vector R difficult to detect. are in each other’s transmission range r. In the best case, for any node i, the adversary’s estimate Rˆi To meet tactical requirements, such as information collect- in Rˆ should be equal to real value Ri in R with probability ing and reporting, we define that there are two roles in the 0.5 (i.e., equivalent to a random 0/1 guess). network: commanding and acting in the following. Note that it seems that the two research problems become Definition 1 (Commanding and Acting Roles): We say a an endless arms race: a concealment method can be developed node is commanding if it has network flows with rates in rate based on attacking a role detection method, and vice versa. As region Σ to/from at least nc nodes (where nc > 1 is said to be both role detection and concealment are not well studied in the threshold for commanding); and say it is acting otherwise. the literature, we aim to propose an initial study on the two Mathematically, we define that the role of node i (i ∈ N ), problems. In particular, we first show that the state-of-the-art denoted by Ri, has value 1 if it is commanding, and value 0 on network flow analysis makes it feasible to detect node roles otherwise; i.e., in a network, then exploit proactive design of countermeasures to conceal node roles, which leads to substantial difficulty for 1 if node i is commanding, Ri = any role detection based on network flow analysis. 0 if node i is acting, for i ∈ N . III. ROLE DETECTION T Then, we define a role vector R = [R1, R2, · · · , Rn] . In this section, we describe our design of role detection Accordingly, the roles of all nodes can be characterized by the methods based on network flow analysis. We first introduce role vector R in the network. We note that R contains im- the backgrounds on network flow analysis, then design our portant, sensitive information in the network and should never methods, and finally use simulations to show the effectiveness be revealed. If R is disclosed, an adversary can immediately of our method. know which node plays an important (commanding) role in A. Backgrounds on Network Flow Analysis the tactical network. It is worth noting that the rate region Σ is a set of allowed According to our definitions, the role Ri of node i is based rates. It can be a generic region, such as [σ, +∞) to take into on the number of its network flows to other nodes. Therefore, account any network flow as long as the flow rate is larger our design of role detection must be based on network flow than a threshold σ. It can also be a specific region, such as analysis, i.e., estimating the rates of all possible flows in [σ − ǫ, σ + ǫ] to only consider network flows generated by a the network. Recent advances in network flow analysis have military standard with a fix communication rate σ, where ǫ is already established a research line called network tomography, the allowed error margin. which is an effective way to infer end-to-end flow or link rates from network measurements [8]–[14]. Thus, it is necessary to B. Adversary Model briefly introduce network tomography before moving to the We assume a relatively strong attacker existing in the design of network flow analysis based on role detection. n(n−1) network. The goal of the attacker is to successfully detect the In the network with n nodes, there are at most 2 1 role of each node in the network; i.e., decide whether a node undirected flows . All of them are associated with a flow n(n−1) ×1 is commanding or acting. The attacker can overhear the data rate vector x ∈ R 2 , whose entry represents the rate transmissions on each link and estimate the transmission rate at of each flow. The attacker aims to get an estimate xˆ in close each link (e.g., by placing eavesdroppers all over the network). value to x. However, the attacker cannot directly see x, but can The attacker is aware of the network topology; hence, given only observe the data transmission on each link.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages6 Page
-
File Size-