In a wireless ad hoc network, a routing system may route message traffic between nodes of the network through multiple intermediate links (or hops) along a path. A routing system may use an ad hoc routing protocol that selects paths (or routes) that make efficient use of network resources. Ad hoc routing protocols include Optimal Link-State Routing, Dynamic Source Routing, and Ad hoc On-demand Distance Vector Routing. To evaluate the efficiency of a path, a routing system may consider the delay incurred by transmitting data over a link of the path, the energy cost of transmitting data over a link of the path, the effect on network throughput of transmitting data over a link of a path, and so on.
When a network is deployed in a hostile environment, a routing system that uses a multi-link routing protocol is susceptible to various types of attacks by an adversary. The routing protocol itself may be exploited in an attack. For example, an adversary in control of several network nodes may spread false information about the network topology during route selection. This false information may result in paths that are inefficient or pass through adversarial nodes, potentially leading to eavesdropping or packet loss. Ad hoc routing protocols may use authentication checks to prevent unauthorized nodes from interfering with route selection. However, even if the routing protocol is executed properly, each intermediate link creates a potential point of adversarial attack. For example, the adversary can carry out a denial-of-service attack by jamming an intermediate link. If messages are decrypted and re-encrypted at each hop, then recovery of the encryption key used by an intermediate link, either through cryptanalysis or physical capture, would allow the adversary to eavesdrop on a communication session. Many lightweight key management protocols use the same keys to secure different links. Unfortunately, the use of the same key for different links increases vulnerability to key compromise, because once an adversary captures a single key (e.g., through node capture), the adversary can eavesdrop on all the links that use that captured key.
In a heterogeneous network, different intermediate links will have varying levels of resilience to attack. Because of the different levels of resiliency, the most efficient path in terms of resource usage may also be highly vulnerable to attack. It would be desirable to have a routing system that factors in the vulnerability of the links to attack to select paths that are highly efficient in terms of resource usage and have a low vulnerability to attack.
A method and system for routing data along a path that is both efficient and secure is provided. In some embodiments, a performance and vulnerability routing system (“PV routing system”) selects a path for routing using a joint performance vulnerability metric (“joint PV metric”) for a link in a network of nodes. The PV routing system calculates the joint PV metric based on a combination of a performance metric and a vulnerability metric of a link. The performance metric for a link indicates the cost of transmitting data over the link, and the vulnerability metric for the link indicates the security of data that is transmitted over the link. The PV routing system combines the performance metric and the vulnerability metric to generate the joint PV metric, which indicates a joint PV cost of transmitting data. The PV routing system then selects paths for transmitting data that tend to minimize the sum of the joint PV costs of the links along the paths.
The PV routing system may combine the performance metric and the vulnerability metric in various ways to generate the joint PV metric. For example, the PV routing system may add the performance metric and the vulnerability metric to generate the joint PV metric. As another example, the PV routing system may use the vulnerability metric as a threshold to determine whether to route over a link. If the vulnerability metric for a link is greater than a vulnerability threshold, then the PV routing system sets the joint PV metric to the performance metric. If, however, the vulnerability metric for the link is not greater than the vulnerability threshold, the PV routing system sets the joint metric to a value (e.g., the highest possible value) so that data is not transmitted over the link. The performance metric may be based on the expected number of transmissions involved in sending a packet of data over a link. For example, if a link is unreliable and many re-transmissions are needed, then the link has a high performance metric indicating that it is costly to transmit over that link. The PV routing system may base the performance metric on one or more cost characteristics that may include delay incurred by transmitting data over the link, energy cost of transmitting data over the link, and effect on network throughput of transmitting data over the link. The PV routing system may base the vulnerability metric on resilience of the link to the compromise of a key used to encrypt data that is transmitted over the link. For example, if a node that transmits data over a link is highly susceptible to capture, then the link may be given a high vulnerability metric. The resilience of a link may be based on expected time to have all keys that are used to encrypt data transmitted over the link compromised. In some embodiments, the PV routing system may also base the vulnerability metric on the risk that data being transmitted over the link will be compromised. Data transmitted over a link may be compromised in various ways such as by eavesdropping, denial of service, and route misdirection. A characteristic of the joint PV metric may be that its value decreases with a decreasing vulnerability metric and increases with an increasing performance metric. In some embodiments, the PV routing system may transmit data between a pair of nodes in a wireless network only when the nodes are within a transmission range and the nodes share an encryption key. The PV routing system may transmit data between the pair only when the vulnerability metric for the link between the nodes satisfies the vulnerability threshold.
The notation used in the following is defined in Table 1. The PV routing system may consider a network of N nodes to be indexed by the set V={1, . . . , N}. The nodes may be deployed over an area A ⊂ R2 with node i at position xi ∈ A. The PV routing system assumes that two nodes are capable of communicating over a direct wireless channel if they are within radio range r. Based on this assumption, the network has a range graph structure Gg=(V,Eg), where for any i, j ∈ V, (i, j)∈ Eg if and only if ∥xi-xj∥2≦r.
Due to the computational overhead associated with public key cryptography, the PV routing system may assume that nodes communicate with secret keys drawn from a key pool K according to a key distribution function ƒ:V→P(K), where P(K) is the set of subsets of K. Two nodes i, j ∈ V are capable of communicating securely only if they share at least one cryptographic key, i.e., if ƒ(i)∩ƒ(j)≠0. This induces a key graph structure Gk=(V,Ek), where (i, j) ∈ Ek if and only if ƒ(i)∩ƒ(j)≠0. The intersection of these two graph structures provides the set of nodes that are capable of secure communication. The network is considered to have the graph structure G=(V,E), where E=Ek∩Eg.
The PV routing system assumes an adversary that is active, mobile, and resource-constrained. An active adversary is capable of both passive eavesdropping and physically capturing nodes. Once a node is captured, the adversary gains access to its secret keys. As time progresses, the network may perform updates by adding new nodes, revoking compromised keys, and updating nodes with new keys. The PV routing system may assume that, due to resource constraints, the adversary cannot compromise a large subset of the network between updates. The adversary's mobility may enable it to monitor links throughout the network and gain knowledge of the network and routing topologies. This, combined with knowledge of the network protocols used, may allow the adversary to eavesdrop on any communication that is unencrypted or encrypted using compromised keys.
The PV routing system employs a metric that can be used to jointly evaluate vulnerability and performance of a given link. The end-to-end performance-security characteristics of a path can be described as the sum of the link metric values, allowing the use of standard shortest-path routing protocols.
The following definitions may be used to define the various metrics.
The PV routing system may base the performance metric on the delay incurred by using a link, the energy cost of making a transmission, or the effect of using a link on network throughput. Definition 3 states that a joint PV metric is well defined if its value decreases with decreasing vulnerability and increases with increased cost. Based on this definition, paths with the shortest length according to a joint PV metric will have minimal cost and a high security value. In the following, the joint PV metric is defined in terms of cost and vulnerability link metrics.
for any path π′=(i=i0′, i1′, . . . , ik′′=j).
Because the PV routing system bases the criteria for optimality on shortest paths, the joint PV metric can be integrated into existing routing protocols. By the definition of the joint PV metric, links with lower joint PV metric values will have higher security and lower cost.
This definition is a threshold metric because links with a vulnerability metric exceeding a certain threshold are considered by the routing protocol, while links below the threshold are given infinite cost weight and may be ignored. This requires minimal extra computation compared to performance metrics alone. This threshold metric is based on the rationale that, since compromise of a single link will lead to the capture of all traffic passing through that link, the overall security of a path will be governed by the security of its weakest link. Guaranteeing a certain security level for a path is therefore equivalent to placing a lower bound on the security of the weakest link.
Two link performance metrics that are commonly used by existing routing protocols are hop count and link quality. Hop count is equal to the number of intermediate links in a path and is therefore equivalent to the length of a path when each link has a uniform weight of 1. In a wireless network where channel characteristics vary between links, hop count may not be an appropriate metric, since messages sent over lossy links will need to be retransmitted, leading to high resource cost in spite of low hop count. The ETX metric, the expected number of transmissions involved in sending a packet, may be used to provide an appropriate metric in the presence of lossy links. The ETX metric for link (A, B) is given by 1/(pA*pB), where pA is the packet delivery probability for the A→B link and pB is the packet delivery probability for the B→A link. These probabilities can be estimated by the nodes forming the link through the use of periodic probe packets.
In some embodiments, the PV routing system uses a vulnerability metric that is based on the resilience of a link to key compromise. During a node capture attack, keys that appear with great frequency in the network are captured first by an adversary. The frequency of key reuse is a function of the key distribution scheme used. Hence, the security of a link will depend both on the number of keys used and the number of times that each key is reused by the network.
The joint PV metric may be defined as follows:
In some embodiments of the PV routing system, each node of a pair computes the vulnerability metric for the link between them. If the vulnerability metric does not exceed a specified vulnerability threshold, the nodes do not form any connections. Otherwise, they proceed as in a conventional routing protocol. Because the performance of the routing depends on the vulnerability threshold, a network owner can set the threshold to achieve desired performance and security characteristics.
The processor on which the PV routing system may be implemented may include a central processing unit and local memory and may include input devices (e.g., keyboards and pointing devices), output devices (e.g., display devices), and storage devices (e.g., disk drives). The processors may access computer-readable media that includes computer-readable storage media and data transmission media. The computer-readable storage media includes memory and other storage devices that may have recorded upon or may be encoded with computer-executable instructions or logic that implements the PV routing system. The data transmission media is media for transmitting data using signals or carrier waves (e.g., electromagnetism) via a wire or wireless connection. Various functions of the PV routing system may also be implemented on devices using discrete logic or logic embedded as an application-specific integrated circuit. The nodes and other devices on which the PV routing system may be implemented are computing devices.
The PV routing system may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers, processors, or other devices. Generally, program modules include routines, programs, objects, components, data structures, and so on, that perform particular tasks or implement particular data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments.
Although the subject matter has been described in language specific to structural features and/or acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. Accordingly, the invention is not limited except as by the appended claims.
This application claims the benefit of U.S. Provisional Patent Application No. 61/554,412, entitled JOINT PERFORMANCE-VULNERABILITY ROUTING METRIC, filed Nov. 1, 2011, which is hereby incorporated by reference in its entirety.
This invention was made with government support under No. W911NF-07-1-0287 and No. W911NF-07-D-0001 through the Army Research Laboratory. The government has certain rights in the invention.
| Number | Date | Country | |
|---|---|---|---|
| 61554412 | Nov 2011 | US |