Dongsheng Zhang*, Santosh A. Gogi*, Dan S. Broyles ...•Dongsheng Zhang, Santosh Ajith Gogi, Dan S....

1
Extend existing KU challenge simulation module (KU-CSM) to wireless networks Model time-varying MANETs as link availability matrix by aggregating evolving graphs into a static graph Use different graph metrics as node significance indicators for MANETs Study and compare different MANET routing protocols’ behaviour under malicious attacks Model realistic large-scale challenge environments using a moving polygon Provide a comprehensive and integrated model of attacks and challenges and against wireless networks Understanding Challenges and Their Impact Understanding network behaviour under perturbations can improve the performance of current networks, as well as lead to a more resilient and survivable Future Internet. Therefore, it is essential to have a thorough understanding of the network behaviour when exposed to challenges, such as component failures, attacks, large-scale disasters, and effects of the mobile wireless communication environment. Furthermore, intelligent attacks with an adaptive scheme can cause the most damage. Recognition of network disruptions and their causes is crucial for planning and designing networks. In particular, the mobile ad hoc network (MANET) environment has a dynamic and intermittent connectivity resulting from channel fading and mobility of the nodes. Some MANET environments suffer from energy constraints and unpredictable propagation delays. Hence, it is more complex and difficult to model these networks and apply challenges to them. Network Design Networks are built by humans and are not completely resilient due to design flaws and cost constraints. While redundancy and diversity increase resilience, they also add to the cost of the network. Optimising the network design process while considering realistic constraints such as node locations and deployment costs is nontrivial. Modelling Challenge on Wireless Networks We model attacks and challenges against MANETs in two aspects: malicious and area-based. In the malicious attack model, the challenges are exerted on a few specific nodes based on their importance. MANETs are modelled as TVGs (time-varying graphs) and the evolution of the network can be described as a sequence of static graphs. Pairwise node interactions within a certain time window are aggregated into one static graph. The network can be represented as a weighted adjacency matrix, in which the weights refer to the link availability. We utilise centrality metrics of the weighted graphs to measure the significance of a node. Attacks targeted toward nodes with high significance could degrade network performance severely. As opposed to node and link failures that affect single or multiple elements, area-based challenges could affect numerous network components. A moving n-sided polygon is used to model the effect of a rainstorm on mesh networks. I. MOTIVATION Use combined graph metrics as node significance indicators Model challenges and attacks against heterogeneous networks Consider energy constraints of mobiles nodes Model node movements using different mobility models V. FUTURE WORK Modelling Malicious Attacks In real-time MANETs communications, it is critical that nodes are available as transceivers or relay nodes for others. Two nodes are adjacent if they are within the transmission range of each other (without interference) and are connected if they can be reached via multi-hop links. We assume node communications are symmetric to simplify the graph model for malicious attacks. In a MANET environment, the dynamic networks can be modelled using TVGs defined as = ,,,,, , where definitions of and is the same as in static graphs except that they vary over time. is the lifetime of the system; indicates the time to traverse a link; and indicate the availability of a specific link and node at a given time. All the interactions between nodes given a time range are aggregated into a static weighted graph, where the link weights represent link availability between node pairs. We calculate degree, betweenness, and closeness centrality of the weighted graphs. We employ them as the node significance indicators and model attacks against the most critical nodes adaptively. We use the mobility trace file output from the ns-3 simulation and for each time step, an adjacency matrix representing the transient topology can then be obtained. An example of node topologies at four consecutive time steps is shown in Figure 1. We sum up the matrices for each time step within the time window and the link availability of any pair of nodes can be calculated as the number of 1s divided by the total number of time steps during that time window. Therefore, node interactions for each time window are aggregated into a static graph as shown in Figure 2, based on which centrality metrics can be calculated. Table 1 presents values of three centrality metrics for all four nodes. For this scenario, node 1 will be attacked prior to other nodes based on degree centrality. III. MODELLING ATTACKS AND CHALLENGES IV. RESULTS and ANALYSIS Modelling Challenges and Attacks to Wireless Networks Dongsheng Zhang*, Santosh A. Gogi*, Dan S. Broyles*, Egemen K. Çetinkaya*, and James P.G. Sterbenz * *EECS and ITTC, The University of Kansas SCC and InfoLab21, Lancaster University http://www.ittc.ku.edu/resilinets Acknowledgements: This project is supported in part by the National Science Foundation FIND and GENI programs, and the EU FIRE Programme Performance Measures We measure network performance under random malicious attacks based on three graph metrics in terms of aggregate packet delivery ratio (PDR). Results Figure 5 shows the impact of time window size on the PDR difference between random and centrality-based attacks using OLSR protocol. The difference between random and centrality- based attacks is greater when time window size is small. August 2012 InfoLab 21 II. RESEARCH GOALS Modelling Area-based Attacks We simulate the effect of a rainstorm in a fixed wireless backbone network. A snapshot of a rainstorm radar image in Midwest US is shown is Figure 4. In the simulations, the topology consists of 16 stationary nodes in a square mesh structure with link distance between each pair of nodes being 1000 m. Each node is both the CBR traffic source and sink. We measure the network performance during a simulated rainstorm, which is modelled as an 8-sided moving polygon as shown in Figure 3. The challenge moves across the topology at a speed of 100 m/s horizontally. 0.00 1.00 0.75 0.25 1.00 0.00 0.25 0.00 0.75 0.25 0.00 0.50 0.25 0.00 0.50 0.00 1 3 2 4 1 0.75 0.5 0.25 0.25 Figure 1. MANET topologies at four consecutive time steps 1000 m Figure 4. Radar image for rain distribution Figure 3. Moving polygon with simulation topology Figure 5. Impact of time windows on accuracy of centrality Figure 6. PDR for moving polygon Node Degree Betweenness Closeness 1 2.00 0.67 0.53 2 1.25 0.00 0.39 3 1.50 0.67 0.53 4 0.75 0.00 0.31 1 3 2 4 1 3 2 4 1 3 2 4 1 3 2 4 Figure 2. Aggregated graph and adjacency matrix Table 1. Three centrality values for each node VI. PUBLICATIONS Dongsheng Zhang, Santosh Ajith Gogi, Dan S. Broyles, Egemen K. Çetinkaya, James P.G. Sterbenz, “Modelling Attacks and Challenges to Wireless Networks”, IEEE/IFIP Workshop on Reliable Networks Design and Modeling (RNDM), October 2012 Egemen K. Çetinkaya, Dan Broyles, Amit Dandekar, Sripriya Srinivasan, James P.G. Sterbenz, “Modelling Communication Network Challenges for Future Internet Resilience, Survivability, and Disruption Tolerance: A Simulation-Based Approach”, Springer Telecommunication Systems Journal, September 2011 1 3 4 2 Severe degradation due to the large-scale effect of weather disruption can be observed from 82 to 86 s in Figure 6. The network’s service capability decreases by approximately 75%.

Transcript of Dongsheng Zhang*, Santosh A. Gogi*, Dan S. Broyles ...•Dongsheng Zhang, Santosh Ajith Gogi, Dan S....

Page 1: Dongsheng Zhang*, Santosh A. Gogi*, Dan S. Broyles ...•Dongsheng Zhang, Santosh Ajith Gogi, Dan S. Broyles, Egemen K. Çetinkaya, James P.G. Sterbenz, “Modelling Attacks and Challenges

• Extend existing KU challenge simulation module (KU-CSM) to wireless networks

•Model time-varying MANETs as link availability matrix by aggregating evolving graphs into a static graph

•Use different graph metrics as node significance indicators for MANETs

• Study and compare different MANET routing protocols’ behaviour under malicious attacks

•Model realistic large-scale challenge environments using a moving polygon

• Provide a comprehensive and integrated model of attacks and challenges and against wireless networks

•Understanding Challenges and Their Impact

Understanding network behaviour under perturbations can improve the performance of current networks, as well as lead to a more resilient and survivable Future Internet. Therefore, it is essential to have a thorough understanding of the network behaviour when exposed to challenges, such as component failures, attacks, large-scale disasters, and effects of the mobile wireless communication environment. Furthermore, intelligent attacks with an adaptive scheme can cause the most damage. Recognition of network disruptions and their causes is crucial for planning and designing networks. In particular, the mobile ad hoc network (MANET) environment has a dynamic and intermittent connectivity resulting from channel fading and mobility of the nodes. Some MANET environments suffer from energy constraints and unpredictable propagation delays. Hence, it is more complex and difficult to model these networks and apply challenges to them.

•Network Design

Networks are built by humans and are not completely resilient due to design flaws and cost constraints. While redundancy and diversity increase resilience, they also add to the cost of the network. Optimising the network design process while considering realistic constraints such as node locations and deployment costs is nontrivial.

•Modelling Challenge on Wireless Networks

We model attacks and challenges against MANETs in two aspects: malicious and area-based. In the malicious attack model, the challenges are exerted on a few specific nodes based on their importance. MANETs are modelled as TVGs (time-varying graphs) and the evolution of the network can be described as a sequence of static graphs. Pairwise node interactions within a certain time window are aggregated into one static graph. The network can be represented as a weighted adjacency matrix, in which the weights refer to the link availability. We utilise centrality metrics of the weighted graphs to measure the significance of a node. Attacks targeted toward nodes with high significance could degrade network performance severely. As opposed to node and link failures that affect single or multiple elements, area-based challenges could affect numerous network components. A moving n-sided

polygon is used to model the effect of a rainstorm on mesh networks.

I. MOTIVATION

•Use combined graph metrics as node significance indicators

•Model challenges and attacks against heterogeneous networks

• Consider energy constraints of mobiles nodes

•Model node movements using different mobility models

V. FUTURE WORK

•Modelling Malicious Attacks

In real-time MANETs communications, it is critical that nodes are available as transceivers or relay nodes for others. Two nodes are adjacent if they are within the transmission range of each other (without interference) and are connected if they can be reached via multi-hop links. We assume node communications are symmetric to simplify the graph model for malicious attacks.

In a MANET environment, the dynamic networks can be modelled using TVGs defined as 𝐺 = 𝑉, 𝐸, 𝒯, 𝜌, 𝜁, 𝜈 , where definitions of 𝑉 and 𝐸 is the same as in static graphs except that they vary over time. 𝒯 is the lifetime of the system; 𝜁 indicates the time to traverse a link; 𝜌 and 𝜈 indicate the availability of a specific link and node at a given time. All the interactions between nodes given a time range are aggregated into a static weighted graph, where the link weights represent link availability between node pairs. We calculate degree, betweenness, and closeness centrality of the weighted graphs. We employ them as the node significance indicators and model attacks against the most critical nodes adaptively. We use the mobility trace file output from the ns-3 simulation and for each time step, an adjacency matrix representing the transient topology can then be obtained. An example of node topologies at four consecutive time steps is shown in Figure 1. We sum up the matrices for each time step within the time window and the link availability of any pair of nodes can be calculated as the number of 1s divided by the total number of time steps during that time window. Therefore, node interactions for each time window are aggregated into a static graph as shown in Figure 2, based on which centrality metrics can be calculated. Table 1 presents values of three centrality metrics for all four nodes. For this scenario, node 1 will be attacked prior to other nodes based on degree centrality.

III. MODELLING ATTACKS AND CHALLENGES IV. RESULTS and ANALYSIS

Modelling Challenges and Attacks to Wireless Networks Dongsheng Zhang*, Santosh A. Gogi*, Dan S. Broyles*, Egemen K. Çetinkaya*, and James P.G. Sterbenz‡*

*EECS and ITTC, The University of Kansas – ‡SCC and InfoLab21, Lancaster University – http://www.ittc.ku.edu/resilinets

Acknowledgements: This project is supported in part by the National Science Foundation FIND and GENI programs, and the EU FIRE Programme

•Performance Measures

We measure network performance under random malicious attacks based on three graph metrics in terms of aggregate packet delivery ratio (PDR).

•Results

Figure 5 shows the impact of time window size on the PDR difference between random and centrality-based attacks using OLSR protocol. The difference between random and centrality-based attacks is greater when time window size is small.

August 2012

InfoLab 21

II. RESEARCH GOALS

•Modelling Area-based Attacks

We simulate the effect of a rainstorm in a fixed wireless backbone network. A snapshot of a rainstorm radar image in Midwest US is shown is Figure 4. In the simulations, the topology consists of 16 stationary nodes in a square mesh structure with link distance between each pair of nodes being 1000 m. Each node is both the CBR traffic source and sink. We measure the network performance during a simulated rainstorm, which is modelled as an 8-sided moving polygon as shown in Figure 3. The challenge moves across the topology at a speed of 100 m/s horizontally.

0.00 1.00 0.75 0.25

1.00 0.00 0.25 0.00

0.75 0.25 0.00 0.50

0.25 0.00 0.50 0.00

1

3

2

4

1

0.75

0.5

0.25 0.25

Figure 1. MANET topologies at four consecutive time steps

1000 m

Figure 4. Radar image for rain distribution Figure 3. Moving polygon with simulation topology

Figure 5. Impact of time windows on accuracy of centrality

Figure 6. PDR for moving polygon

Node Degree Betweenness Closeness

1 2.00 0.67 0.53

2 1.25 0.00 0.39

3 1.50 0.67 0.53

4 0.75 0.00 0.31

1

3

2

4

1

3

2 4

1

3

2

4

1

3

2

4

Figure 2. Aggregated graph and adjacency matrix

Table 1. Three centrality values for each node

VI. PUBLICATIONS

•Dongsheng Zhang, Santosh Ajith Gogi, Dan S. Broyles, Egemen K. Çetinkaya, James P.G. Sterbenz, “Modelling Attacks and Challenges to Wireless Networks”, IEEE/IFIP Workshop on Reliable Networks Design and Modeling (RNDM), October 2012

• Egemen K. Çetinkaya, Dan Broyles, Amit Dandekar, Sripriya Srinivasan, James P.G. Sterbenz, “Modelling Communication Network Challenges for Future Internet Resilience, Survivability, and Disruption Tolerance: A Simulation-Based Approach”, Springer Telecommunication Systems Journal, September 2011

𝑡1

𝑡3 𝑡4

𝑡2

Severe degradation due to the large-scale effect of weather disruption can be observed from 82 to 86 s in Figure 6. The network’s service capability decreases by approximately 75%.