TY - GEN
T1 - Revealing abuses of channel assignment protocols in multi-channel wireless networks
T2 - 17th European Symposium on Research in Computer Security, ESORICS 2012
AU - Gu, Qijun
AU - Jones, Kyle
AU - Zang, Wanyu
AU - Yu, Meng
AU - Liu, Peng
PY - 2012/9/5
Y1 - 2012/9/5
N2 - This paper presents a novel specification-based investigation logic and applies it to tackle abuse of channel assignment protocols in multi-channel wireless networks. The investigation logic looks into malicious operations that violate the specification of channel assignment protocols. With logged operations, it reconstructs the process of channel assignment as an information flow that captures essential dependency relations among protocol-specific channel assignment operations. Then, it derives and applies reasoning rules to conduct consistency check over the logged operations and identify the source of abuse where the logged operations are inconsistent. Through simulation, the proposed investigation logic presents desired quality with zero false negative rate and very low false positive rate.
AB - This paper presents a novel specification-based investigation logic and applies it to tackle abuse of channel assignment protocols in multi-channel wireless networks. The investigation logic looks into malicious operations that violate the specification of channel assignment protocols. With logged operations, it reconstructs the process of channel assignment as an information flow that captures essential dependency relations among protocol-specific channel assignment operations. Then, it derives and applies reasoning rules to conduct consistency check over the logged operations and identify the source of abuse where the logged operations are inconsistent. Through simulation, the proposed investigation logic presents desired quality with zero false negative rate and very low false positive rate.
UR - http://www.scopus.com/inward/record.url?scp=84865594232&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84865594232&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-33167-1_17
DO - 10.1007/978-3-642-33167-1_17
M3 - Conference contribution
AN - SCOPUS:84865594232
SN - 9783642331664
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 289
EP - 306
BT - Computer Security, ESORICS 2012 - 17th European Symposium on Research in Computer Security, Proceedings
Y2 - 10 September 2012 through 12 September 2012
ER -