Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Computer Engineering

Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague May 2013

Network Self-Organization In The Internet Of Things, Arjun Athreya, Patrick Tague

Patrick Tague

The Internet of Things is a paradigm that allows the interaction of ubiquitous devices through a network to achieve common goals. This paradigm like any man-made infrastructure is subject to disasters, outages and other adversarial conditions. Under these situations provisioned communications fail, rendering this paradigm with little or no use. Hence, network self-organization among these devices is needed to allow for communication resilience. This paper presents a survey of related work in the area of self-organization and discusses future research opportunities and challenges for self-organization in the Internet of Things. We begin this paper with a system perspective of the ...


Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague May 2013

Asia: Accelerated Secure In-Network Aggregation In Vehicular Sensing Networks, Xiao Wang, Patrick Tague

Patrick Tague

Vehicular Ad-Hoc Networks (VANETs) can potentially become a sensing platform. In-network aggregation, a fundamental primitive for querying sensory data, has been shown to reduce overall communication overhead at large. To secure data aggregation in VANETs, existing schemes mainly rely on digital signatures. However, generating and verifying such signatures can cause high computational overhead. More importantly, time-consuming verifications lead to the vulnerability to signature flooding attacks in which a receiver cannot timely verify all messages before their respective deadlines. In this paper, we propose ASIA as an Accelerated Secure In-network Aggregation strategy that can accelerate message verifications and significantly reduce computational ...


Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang May 2013

Unlocin: Unauthorized Location Inference On Smartphones Without Being Caught, Le Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, Sanjay Parab, Yu Seung Kim, Patrick Tague, Joy Zhang

Patrick Tague

Location privacy has become one of the critical issues in the smartphone era. Since users carry their phones everywhere and all the time, leaking users’ location information can have dangerous implications. In this paper, we leverage the idea that Wi-Fi parameters not considered to be “sensitive” in the Android platform can be exploited to learn users’ location. Though the idea of using Wi-Fi information to breach location privacy is not new, we extend the basic idea and show that clever attackers can do so without being detected by current malware detection techniques. To achieve this goal, we develop the Unauthorized ...


How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague May 2013

How To Jam Without Getting Caught: Analysis And Empirical Study Of Stealthy Periodic Jamming, Bruce Debruhl, Patrick Tague

Patrick Tague

Despite the widespread commercial use of spread spectrum technology, advanced algorithms and modern hardware capabilities still allows efficient denial-of-service attacks against wireless communication systems using jamming. Much of the recent work on jamming mitigation has focused on how to adjust the transmitter-receiver system once a jamming attack has been detected. However, characterizing the detectability of certain classes of jamming attacks remains a largely unstudied problem. We aim to narrow this gap by analyzing the effect of a class of periodic jamming attacks on the attack detection metrics of packet delivery ratio (PDR) and received signal strength (RSS). We show that ...


Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague May 2013

Stochastic Optimization Of Flow-Jamming Attacks In Multichannel Wireless Networks, Yu Seung Kim, Bruce Debruhl, Patrick Tague

Patrick Tague

An attacker can launch an efficient jamming attack to deny service to flows in wireless networks by using cross-layer knowledge of the target network. For example, flow-jamming defined in existing work incorporates network layer information into the conventional jamming attack to maximize its attack efficiency. In this paper, we redefine a discrete optimization model of flow-jamming in multichannel wireless networks and provide metrics to evaluate the attack efficiency. We then propose the use of stochastic optimization techniques for flow-jamming attacks by using three stochastic search algorithms: iterative improvement, simulated annealing, and genetic algorithm. By integrating the algorithms into a simulation ...


Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague Mar 2013

Selfish Manipulation Of Cooperative Cellular Communications Via Channel Fabrication, Shrikant Adhikarla, Min Suk Kang, Patrick Tague

Patrick Tague

In today’s cellular networks, user equipment (UE) have suffered from low spectral efficiency at cell-edge region due to high interference from adjacent base stations (BSs), which share the same spectral radio resources. In the recently proposed cooperative cellular networks, geographically separated multiple BSs cooperate on transmission in order to improve the UE’s signal-to-interference-plus-noise-ratio (SINR) at cell-edge region. The service provider of the system dynamically assigns the cluster of BSs to achieve higher SINR for the UE while optimizing the use of system radio resources. Although it is the service provider that makes the clustering decision for the UE ...


Self-Organization Of A Mesh Hierarchy For Smart Grid Monitoring In Outage Scenarios, Arjun Athreya, Patrick Tague Jan 2013

Self-Organization Of A Mesh Hierarchy For Smart Grid Monitoring In Outage Scenarios, Arjun Athreya, Patrick Tague

Patrick Tague

Current hierarchical communication infrastructure in the smart grid is not robust for data collection from smart meters during outages. In this work, we propose a self-organizing multi-channel wireless communication framework to aid in data collection for smart grid health monitoring. We propose a two-stage bootstrapping process in which nodes first self-organize into local mesh clusters by flattening the provisioned hierarchy and then interconnect to provide mesh connectivity from the outage region to functioning regions of the grid. We propose to construct this mesh-of-meshes hierarchy using a cross-layer strategy that jointly considers medium access limitations and the asymmetric traffic flow that ...


Stir-Ing The Wireless Medium With Self-Tuned, Inference-Based, Real-Time Jamming, Bruce Debruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Sep 2012

Stir-Ing The Wireless Medium With Self-Tuned, Inference-Based, Real-Time Jamming, Bruce Debruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague

Patrick Tague

Jamming, broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system’s configuration. In this work, we extend the attacker’s capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate ...


All Your Jammers Belong To Us - Localization Of Wireless Sensors Under Jamming Attack, Yu Seung Kim, Frank Mokaya, Eric Chen, Patrick Tague May 2012

All Your Jammers Belong To Us - Localization Of Wireless Sensors Under Jamming Attack, Yu Seung Kim, Frank Mokaya, Eric Chen, Patrick Tague

Patrick Tague

Accurately determining locations of nodes in mobile wireless network is crucial for a myriad of applications. Unfortunately, most localization techniques are vulnerable to jamming attacks where the adversary attempts to disrupt communication between legitimate nodes in the network. In this paper, we propose an approach to localize a wireless node by using jamming attack as the advantage of the network. Our localization technique is divided into two steps. First, we discover the location of the jammer using power adaptation techniques. Then, we use these properties to extrapolate the locations of jammed nodes. We design a localization protocol using this technique ...


S-Span: Secure Smart Posters In Android Using Nfc (Demo), Jason Wu, Lin Qi, Nishant Kumar, Ram Shankar Siva Kumar, Patrick Tague May 2012

S-Span: Secure Smart Posters In Android Using Nfc (Demo), Jason Wu, Lin Qi, Nishant Kumar, Ram Shankar Siva Kumar, Patrick Tague

Patrick Tague

Smart posters are a promising new use case for NFC-enabled mobile devices, but to date there has been a general lack of security mechanisms for NFC smart posters. We present S-SPAN - a secure smart poster system consisting of three parts: an administrative web interface for managing posters, a backend server for storing and serving data, as well as an Android application for end-users. S-SPAN enforces confidentiality and integrity of smart poster data as well as authentication/authorization of administrators and end-users, thus ensuring that only authorized users can access the content.


Living With Boisterous Neighbors: Studying The Interaction Of Adaptive Jamming And Anti-Jamming, Bruce Debruhl, Patrick Tague May 2012

Living With Boisterous Neighbors: Studying The Interaction Of Adaptive Jamming And Anti-Jamming, Bruce Debruhl, Patrick Tague

Patrick Tague

Jamming has long been a problem in wireless communications, but with recent advances in adaptive jamming, adaptive anti-jamming, and other advanced physical layer security techniques, it is hard to understand whether we can keep the jammer at bay. In this work, we consider this problem and introduce a game-theoretic framework which gives us a tool to analyze the complex adaptive jamming and anti-jamming space. To illustrate the strengths and weaknesses in intelligent jamming and anti-jamming techniques, we present a straightforward two-player instance and analyze a number of possible jamming and anti-jamming techniques.


Jamming-Resistant Distributed Path Selection On Wireless Mesh Networks (Demo), Yu Seung Kim, Patrick Tague Feb 2012

Jamming-Resistant Distributed Path Selection On Wireless Mesh Networks (Demo), Yu Seung Kim, Patrick Tague

Patrick Tague

Wireless mesh network is an emerging network architecture which have been actively standardized for the last few years. Because of its flexible network architecture, wireless mesh network can provide alternative paths even when some of wireless links are broken by node failures or intended attacks. Among various types of mesh network, we focus on the most recent mesh standard, IEEE 802.11s and its resiliency to jamming attack. In the demo, we show jamming effects on wireless mesh network and the performance of the hybrid wireless mesh protocol (HWMP) defined in IEEE 802.11s and our proposed distributed path selection ...


A Toolbox To Explore The Interaction Of Adaptive Jamming And Anti-Jamming (Demo), Bruce Debruhl, Yu Seung Kim, Patrick Tague Feb 2012

A Toolbox To Explore The Interaction Of Adaptive Jamming And Anti-Jamming (Demo), Bruce Debruhl, Yu Seung Kim, Patrick Tague

Patrick Tague

Jamming has long been a problem in wireless communications. Recently, adaptive jamming and anti-jamming techniques have been proposed which aim to use feedback to better perform their task. For an anti-jamming receiver this means detecting jamming and adapting its protocol appropriately. For a jammer this means using feedback from the legitimate system to design a high-impact, low-power, hard-to-detect attack. In this work we introduce a toolbox to allow users to tests the performance of adaptive jamming and anti-jamming on the USRP2 radio platform. These test provide an important function by letting developers understand how well new protocols work against evolving ...


Mitigation Of Periodic Jamming In A Spread Spectrum System By Adaptive Filter Selection, Bruce Debruhl, Patrick Tague Jan 2012

Mitigation Of Periodic Jamming In A Spread Spectrum System By Adaptive Filter Selection, Bruce Debruhl, Patrick Tague

Patrick Tague

Jamming has long been a problem in wireless communication systems. Traditionally, defense techniques have looked to raise the cost of mounting an equally effective jamming attack. One technique to raise the cost of jamming is direct sequence spread spectrum (DSSS) which spreads data over a wider bandwidth and has built-in error correction. To work around this, attackers have developed intelligent jamming techniques to minimize the cost of mounting attacks on these systems. To lower the cost of attacking a DSSS system, an attacker can use periodic jamming which alternates between an attacking and sleeping state. Previously, a digital filter has ...


Shortmac: Efficient Data-Plane Fault Localization, Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Kim, Adrian Perrig, Patrick Tague Jan 2012

Shortmac: Efficient Data-Plane Fault Localization, Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Kim, Adrian Perrig, Patrick Tague

Patrick Tague

The rising demand for high-quality online services requires reliable packet delivery at the network layer. Dataplane fault localization is recognized as a promising means to this end, since it enables a source node to localize faulty links, find a fault-free path, and enforce contractual obligations among network nodes. Existing fault localization protocols cannot achieve a practical tradeoff between security and efficiency and they require unacceptably long detection delays, and require monitored flows to be impractically long-lived. In this paper, we propose an efficient fault localization protocol called ShortMAC, which leverages probabilistic packet authentication and achieves 100 – 10000 times lower detection ...


Survivable Smart Grid Communication: Smart-Meters Meshes To The Rescue, Arjun Athreya, Patrick Tague Dec 2011

Survivable Smart Grid Communication: Smart-Meters Meshes To The Rescue, Arjun Athreya, Patrick Tague

Patrick Tague

Smart grids are critical cyber-physical infrastructures in the world now. Since these infrastructures are prone to large scale outages due to disasters or faults, a resilient and survivable communication architecture is desired. In this work, we propose a resilient and survivable hierarchical communication architecture for the smart grid that mirrors the hierarchy of the existing power grid. Post-disaster resilience in grid communication is achieved through the grid flattening process. This process involves smart-meters and other disaster surviving elements of higher system levels of the grid forming a wireless mesh network. The flattened network of grid elements with one-hop communication links ...


Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague Jul 2011

Digital Filter Design For Jamming Mitigation In 802.15.4 Communication, Bruce Debruhl, Patrick Tague

Patrick Tague

Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, we analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor networking applications, and show that the cycling behavior introduces a narrow spectral component into the received signal. We propose the inclusion of a digital filter at the receiver side to effectively eliminate this spectral component, and we discuss the benefits involved in this filter design. We evaluate the impacts ...


Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague May 2011

Towards Secure Multi-Path Routing For Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy (Poster), Arjun Athreya, Patrick Tague

Patrick Tague

Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in mobile ad-hoc networks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, we propose a routing mechanism that uses crosslayer strategies. The cross-layer strategy involves incorporating feedback and information from layers below the network layer to make decisions at the network layer. We also propose a path evaluation mechanism for the paths returned by the proposed multi-path routing mechanism.


Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection, Patrick Tague, Sidharth Nabar, James Ritcey, Radha Poovendran Jan 2011

Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection, Patrick Tague, Sidharth Nabar, James Ritcey, Radha Poovendran

Patrick Tague

Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this article, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network’s ability to estimate the impact of ...


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin Griss, Anind Dey Nov 2010

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin Griss, Anind Dey

Patrick Tague

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation ...


Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague Oct 2010

Improving Anti-Jamming Capability And Increasing Jamming Impact With Mobility Control, Patrick Tague

Patrick Tague

The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility can have significant influence on the impact of a jamming attack. In this work, we investigate the use of mobility as a tool to allow both the adversarial network and the network under attack to reconfigure their geometry in an attempt to improve attack impact and protocol performance, respectively. We ...


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingyan Li, Radha Poovendran Aug 2009

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingyan Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For ...


Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran Mar 2009

Evaluating The Vulnerability Of Network Traffic Using Joint Security And Routing Analysis, Patrick Tague, David Slater, Jason Rogers, Radha Poovendran

Patrick Tague

Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary vulnerability definitions using set theoretic and circuit theoretic interpretations of the security of network traffic, allowing a network analyst or an adversary to determine weaknesses in the secure network. We formalize node capture attacks using the vulnerability metric as a nonlinear integer programming ...


Tradeoffs Between Jamming Resilience And Communication Efficiency In Key Establishment, Patrick Tague, David Slater, Radha Poovendran, Brian Matt Dec 2008

Tradeoffs Between Jamming Resilience And Communication Efficiency In Key Establishment, Patrick Tague, David Slater, Radha Poovendran, Brian Matt

Patrick Tague

We address the problem of allowing authorized users, who do not preshare a common key, to effectively exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. In this work, we jointly consider the security and efficiency of key exchange protocols, focusing on the interplay between message fragmentation, jamming resilience, and verification complexity for protocol optimization. Finally, we present three fragment verification schemes and demonstrate through analysis and simulation that in comparison with existing approaches, they can significantly decrease the amount of time required for key establishment without degrading the guaranteed level of ...


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran Dec 2007

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For ...


A Canonical Seed Assignment Model For Key Predistribution In Wireless Sensor Networks, Patrick Tague, Radha Poovendran Sep 2007

A Canonical Seed Assignment Model For Key Predistribution In Wireless Sensor Networks, Patrick Tague, Radha Poovendran

Patrick Tague

A promising solution for trust establishment in wireless sensor networks is the assignment of cryptographic seeds (keys, secrets, etc.) to sensor nodes prior to network deployment, known as key predistribution. In this article, we propose a canonical seed assignment model for key predistribution characterizing seed assignment in terms of the probability distribution describing the number of nodes receiving each seed and the algorithm for seed assignment. In addition, we present a sampling framework for seed assignment algorithms in the canonical model. We propose a probabilistic k-connectivity model for randomly deployed secure networks using spatial statistics and geometric random graph theory ...