TY - GEN
T1 - Allocating adversarial resources in wireless networks
AU - Gisdakis, Stylianos
AU - Katselis, Dimitrios
AU - Papadimitratos, Panos
PY - 2013
Y1 - 2013
N2 - A plethora of security schemes for wireless sensor networks (WSNs) has been proposed and their resilience to various attacks analyzed; including situations the adversary compromises a subset of the WSN nodes and/or deploys own misbehaving devices. The higher the degree of such intrusion is, the more effective an attack will be. Consider, however, an adversary that is far from omnipotent: How should she attack, how should she deploy her resources to maximally affect the attacked WSN operation? This basic question has received little attention, with one approach considering genetic algorithms for devising an attack strategy [5]. In this work, we recast the problem towards a more systematic treatment and more computationally efficient solutions: a combination of a genetic algorithm with a convex relaxation, and an ℓ1- constraint formulation. The devising of near-optimal attack strategies efficiently strengthens the adversary, allowing her to adapt and mount effective and thus harmful attacks even in complex and dynamically changing settings.
AB - A plethora of security schemes for wireless sensor networks (WSNs) has been proposed and their resilience to various attacks analyzed; including situations the adversary compromises a subset of the WSN nodes and/or deploys own misbehaving devices. The higher the degree of such intrusion is, the more effective an attack will be. Consider, however, an adversary that is far from omnipotent: How should she attack, how should she deploy her resources to maximally affect the attacked WSN operation? This basic question has received little attention, with one approach considering genetic algorithms for devising an attack strategy [5]. In this work, we recast the problem towards a more systematic treatment and more computationally efficient solutions: a combination of a genetic algorithm with a convex relaxation, and an ℓ1- constraint formulation. The devising of near-optimal attack strategies efficiently strengthens the adversary, allowing her to adapt and mount effective and thus harmful attacks even in complex and dynamically changing settings.
KW - Attack
KW - cryptographic key
KW - genetic algorithm (GA)
KW - security
UR - http://www.scopus.com/inward/record.url?scp=84901380038&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84901380038&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84901380038
SN - 9780992862602
T3 - European Signal Processing Conference
BT - 2013 Proceedings of the 21st European Signal Processing Conference, EUSIPCO 2013
PB - European Signal Processing Conference, EUSIPCO
T2 - 2013 21st European Signal Processing Conference, EUSIPCO 2013
Y2 - 9 September 2013 through 13 September 2013
ER -