In many wireless networks (e.g., tactical military networks), the one-to-multiple communication model is pervasive due to commanding and control requirements in mission operations. In these networks, the roles of nodes are non-homogeneous; i.e., they are not equally important. This, however, opens a door for an adversary to target important nodes in the network by identifying their roles. In this chapter, we focus on investigating an important open question: how to detect and conceal the roles of nodes in wireless networks? Answers to this question are of essential importance to understand how to identify critical roles and prevent them from being the primary targets. We demonstrate via analysis and simulations that it is feasible and even accurate to identify critical roles of nodes by looking at network traffic patterns. To provide countermeasures against role detection, we propose role concealment methods based on proactive and deceptive network strategies. We use simulations to evaluate the effectiveness and costs of the role concealment methods.
在许多无线网络(例如战术军事网络)中,由于任务操作中的指挥和控制要求,一到多个通信模型普遍存在。在这些网络中,节点的作用是非同质的。即,它们并不重要。但是,这为对手打开了一扇门,可以通过识别其角色来针对网络中的重要节点。在本章中,我们专注于研究一个重要的开放问题:如何检测和掩盖节点在无线网络中的作用?这个问题的答案对于了解如何识别关键作用并防止其成为主要目标至关重要。我们通过分析和模拟证明,通过查看网络流量模式来识别节点的关键作用是可行的,甚至是准确的。为了提供反对角色检测的对策,我们提出了基于主动和欺骗性网络策略的角色隐藏方法。我们使用模拟来评估隐藏方法的有效性和成本。