|
|
Welcome to Network Vulnerability
Assessment Project |
In this project, we are interested in modeling and evaluating the impact of node capture attacks on the security provided by particular classes of cryptographic key assignment. Because of the unattended operation of sensors and other ad-hoc network devices, an adversary may be able to perform node capture attacks, i.e., physically capture and compromise network nodes. Toward this problem, we have developed a toolkit which allows a user to specify a set of network and key assignment parameters, create an instance of a secure wireless network, and observe the effects of node capture. We have made the toolkit freely available to download as a Java Application..
This project was completed at NSL under the guidance of Prof. Radha Poovendran.
The graduate students working on this project include Patrick Tague
and David Slater. |
|
|
|
Relevant Research Publications |
Aspect of this tool are based on the following publications
-
Patrick Tague, David Slater, Jason Rogers, and Radha Poovendran,
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis, IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 2, pp. 111-123, April-June 2009.
-
Patrick Tague and Radha Poovendran,
Modeling Node Capture Attacks in Wireless Sensor Networks, Invited Paper, 46th Annual Allerton Conference on Communication, Control, and Computing, September 2008.
-
Patrick Tague, David Slater, Jason Rogers, and Radha Poovendran,
Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis, 27th IEEE Conference on Computer Communications (INFOCOM'08), April 2008.
-
Patrick Tague and Radha Poovendran,
A Canonical Seed Assignment Model for Key Predistribution in Wireless Sensor Networks, ACM Transactions on Sensor Networks, Vol. 3, No. 4, October 2007.
-
Patrick Tague and Radha Poovendran,
Modeling Adaptive Node Capture Attacks in Multihop Wireless Networks, Elsevier Ad Hoc Networks, Vol. 5, No. 6, pp. 801-814, August 2007.
-
Patrick Tague and Radha Poovendran,
A General Probabilistic Model for Improving Key Assignment in Wireless Networks, 4th International Symposium on Modeling and Optimization in Mobile, Ad-hoc, and Wireless Networks (WiOpt '06), 2006.
-
Patrick Tague, Jooyoung Lee, and Radha Poovendran,
A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks, in Proceedings of IEEE ICISIP, December 2005.
|
UW EE Department Annual Research Review Articles |
This system and the corresponding techniques have been featured in the annual research review of the Department of Electrical Engineering at the University of Washington as:
- David Slater and Patrick Tague,
Using Electric Circuits to Evaluate
Vulnerability in Wireless Network Routing, in Electrical Engineering Kaleidoscope (EEK),
University of Washington, 2008.
- David Slater, Patrick Tague,
and Phillip Lee, Vulnerability of
Secure Wireless Networks: A Toolkit for Network Visualization,
in Electrical Engineering Kaleidoscope (EEK),
University of Washington, 2007.
|
|
|