Revealing abuses of channel assignment protocols in multi-channel wireless networks: An investigation logic approach

Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This paper presents a novel specification-based investigation logic and applies it to tackle abuse of channel assignment protocols in multi-channel wireless networks. The investigation logic looks into malicious operations that violate the specification of channel assignment protocols. With logged operations, it reconstructs the process of channel assignment as an information flow that captures essential dependency relations among protocol-specific channel assignment operations. Then, it derives and applies reasoning rules to conduct consistency check over the logged operations and identify the source of abuse where the logged operations are inconsistent. Through simulation, the proposed investigation logic presents desired quality with zero false negative rate and very low false positive rate.

Original languageEnglish (US)
Title of host publicationComputer Security, ESORICS 2012 - 17th European Symposium on Research in Computer Security, Proceedings
Pages289-306
Number of pages18
DOIs
StatePublished - Sep 5 2012
Event17th European Symposium on Research in Computer Security, ESORICS 2012 - Pisa, Italy
Duration: Sep 10 2012Sep 12 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7459 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other17th European Symposium on Research in Computer Security, ESORICS 2012
CountryItaly
CityPisa
Period9/10/129/12/12

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Revealing abuses of channel assignment protocols in multi-channel wireless networks: An investigation logic approach'. Together they form a unique fingerprint.

  • Cite this

    Gu, Q., Jones, K., Zang, W., Yu, M., & Liu, P. (2012). Revealing abuses of channel assignment protocols in multi-channel wireless networks: An investigation logic approach. In Computer Security, ESORICS 2012 - 17th European Symposium on Research in Computer Security, Proceedings (pp. 289-306). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7459 LNCS). https://doi.org/10.1007/978-3-642-33167-1_17