[2018-09-11] Prof. Yih-Chun Hu,UIUC,” Mitigating Power and MAC-based Denial-of-Service in Wireless Networks”

Poster:Post date:2018-09-04

Title: Mitigating Power and MAC-based Denial-of-Service in Wireless Networks

Date: 2018-09-11 11:00-12:00

Location: R103, CSIE

Speaker: Prof. Yih-Chun Hu, University of Illinois at Urbana-Champaign

Hosted by: Prof. Hsu-Chun Hsiao


Wireless networks have resulted in great increases in convenience and productivity across a wide range of application areas. Mobile phones, laptops and tablets, connected home devices, and implantable medical devices all use wireless networking for more convenient deployment. In benign environments, cooperative coordination mechanisms provide significant gains over non-coordinated environments, and designers provision devices with sufficient energy to meet all of their ordinary wireless traffic. However, in an adversarial environment, these mechanisms can be turned against the devices, raising significant risks.

In the area of power-based Denial-of-Service, we observe that many devices are provisioned with a limited amount of energy for the lifetime of the device. Such devices, if subjected to adversarial wireless conditions, might run out of energy much more rapidly than originally intended. In our work, we combine communications with a wireless power delivery mechanism, and examine how we might require the requestor to provide sufficient power to service a request, thus eliminating power as a source of Denial-of-Service against the device.

In the area of MAC-based Denial-of-Service, we examine two core assumptions of Medium Access Control protocols: first, that recipients of coordination information will use it to avoid, rather than attack, the coordinated transmission, and second, that devices that reserve the channel will in fact use that channel. Adversaries can use coordination information against legitimate devices, and can also make false reservations to reduce the amount of bandwidth available to legitimate nodes. We develop mechanisms that mitigate both attacks, first by limiting distribution of coordination information to a recipient list, and choosing a recipient list that maximizes performance, and second by limiting the trust placed in coordination information by weighting a node's coordination information by that node's energy expenditures following previous reservation requests.



Yih-Chun Hu is an associate professor of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign. He recieved his B.S. in Computer Science and Mathematics from the University of Washington, his Ph.D. in Computer Science from Carnegie Mellon University under David B. Johnson, and did a postdoc at the University of California, Berkeley under J. Doug Tygar. Yih-Chun's research interests are in wireless networks and network security.



Last modification time:2018-09-04 PM 2:34

cron web_use_log