Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms

被引:9
作者
Bucur, Doina [1 ]
Iacca, Giovanni [2 ]
Gaudesi, Marco [3 ]
Squillero, Giovanni [3 ]
Tonda, Alberto [4 ]
机构
[1] Univ Groningen, Johann Bernoulli Inst, Nijenborgh 9, NL-9747 AG Groningen, Netherlands
[2] INCAS3, Dr Nassaulaan 9, NL-9401 HJ Assen, Netherlands
[3] Politecn Torino, Corso Duca Abruzzi 24, I-10129 Turin, Italy
[4] INRA, UMR 782, GMPA, 1 Ave Lucien Bretignieres, F-78850 Thiverval Grignon, France
关键词
Cooperative co-evolution; Delay-Tolerant Network; Evolutionary algorithms; Network security; Routing; TEAM COMPOSITION;
D O I
10.1016/j.asoc.2015.11.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In novel forms of the Social Internet of Things, any mobile user within communication range may help routing messages for another user in the network. The resulting message delivery rate depends both on the users' mobility patterns and the message load in the network. This new type of configuration, however, poses new challenges to security, amongst them, assessing the effect that a group of colluding malicious participants can have on the global message delivery rate in such a network is far from trivial. In this work, after modeling such a question as an optimization problem, we are able to find quite interesting results by coupling a network simulator with an evolutionary algorithm. The chosen algorithm is specifically designed to solve problems whose solutions can be decomposed into parts sharing the same structure. We demonstrate the effectiveness of the proposed approach on two medium-sized Delay-Tolerant Networks, realistically simulated in the urban contexts of two cities with very different route topology: Venice and San Francisco. In all experiments, our methodology produces attack patterns that greatly lower network performance with respect to previous studies on the subject, as the evolutionary core is able to exploit the specific weaknesses of each target configuration. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:416 / 426
页数:11
相关论文
共 29 条
[1]   Evolution strategies – A comprehensive introduction [J].
Hans-Georg Beyer ;
Hans-Paul Schwefel .
Natural Computing, 2002, 1 (1) :3-52
[2]   GA-based performance analysis of network protocols [J].
Baldi, M ;
Corno, F ;
Rebaudengo, M ;
Squillero, G .
NINTH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 1997, :118-124
[3]  
Bucur D., 2014, P 16 ANN C GEN EV CO
[4]   Black Holes and Revelations: Using Evolutionary Algorithms to Uncover Vulnerabilities in Disruption-Tolerant Networks [J].
Bucur, Doina ;
Iacca, Giovanni ;
Squillero, Giovanni ;
Tonda, Alberto .
APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2015, 2015, 9028 :29-41
[5]   Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection [J].
Bucur, Doina ;
Iacca, Giovanni ;
de Boer, Pieter-Tjerk .
AD HOC NETWORKS, 2015, 30 :22-45
[6]   The impact of topology on energy consumption for collection tree protocols: An experimental assessment through evolutionary computation [J].
Bucur, Doina ;
Iacca, Giovanni ;
Squillero, Giovanni ;
Tonda, Alberto .
APPLIED SOFT COMPUTING, 2014, 16 :210-222
[7]  
Burgess J., 2006, INFOCOM, V6, P1
[8]  
Burgess J, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P61
[9]  
Darwin C., 1859, On the origin of species by means of natural selection, DOI 10.5962/bhl.title.82303
[10]   Parisian camera placement for vision metrology [J].
Dunn, E ;
Olague, G ;
Lutton, E .
PATTERN RECOGNITION LETTERS, 2006, 27 (11) :1209-1219