The Manipulation of Wireless Networks and DARPA

MAC address. image from wikipedia

From the DARPA website and DARPA-BAA-14-44 WND Phases 2 and 3

The majority of work to develop and mature military wireless networks to date has focused on efficiency and stability in benign conditions…As the use of wireless systems expands, the likelihood of network compromise (whether maliciously or by unwitting misconfiguration) will increase. Beyond the conventional node-by-node security in use today, a set of network-based checks are needed to ensure that misinformation inserted into the control protocols does not disable the network functionality.

The Wireless Network Defense (WND) program is developing and demonstrating new technology to protect the control protocols of wireless networks from the effects of advanced attacks or other forms of compromise. The program focuses on the protocols at the network and medium access control (MAC) layers of the network stack with the goal of protecting those protocols that coordinate among the distributed devices’ management of resources such as spectrum, time, and power, and delivery of information.

The development of this technology will both improve the robustness of the class of wireless networks that are being procured and fielded in the near future, and also provide a reliable foundation on which to build the next generation of wireless systems. These new defenses will minimize the impact of attacks on network control and will force attacks to be observable and attributable in order to be effective.

Ideally…[one] should anticipate both passive listeners and active attackers; colluding attackers; dynamic attacks; and informed adversaries…[One]should assume that passive listeners and  active attackers will be able to collude. That is, the threat model is a real-world adversary.  Systems should be designed to mitigate attacks under all combinations of attackers and attacks…. [One]should further design mitigations and enhancements such that these mitigations and enhancements cannot themselves be leveraged by a knowledgeable adversary to attack the network.

See DARPA-BAA-14-44 WND Phases 2 and 3

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s