Title
Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms
Abstract
Graphical abstractDisplay Omitted HighlightsWe used cooperative co-evolutionary to analyse routing in Delay-Tolerant Networks.We applied the method to two urban-scale network scenarios: Venice and San Francisco.We ran extensive experiments on large networks running First Contact protocol.We found groups of strong colluding attackers able to reduce the data delivery rate. In novel forms of the Social Internet of Things, any mobile user within communication range may help routing messages for another user in the network. The resulting message delivery rate depends both on the users' mobility patterns and the message load in the network. This new type of configuration, however, poses new challenges to security, amongst them, assessing the effect that a group of colluding malicious participants can have on the global message delivery rate in such a network is far from trivial. In this work, after modeling such a question as an optimization problem, we are able to find quite interesting results by coupling a network simulator with an evolutionary algorithm. The chosen algorithm is specifically designed to solve problems whose solutions can be decomposed into parts sharing the same structure. We demonstrate the effectiveness of the proposed approach on two medium-sized Delay-Tolerant Networks, realistically simulated in the urban contexts of two cities with very different route topology: Venice and San Francisco. In all experiments, our methodology produces attack patterns that greatly lower network performance with respect to previous studies on the subject, as the evolutionary core is able to exploit the specific weaknesses of each target configuration.
Year
DOI
Venue
2018
10.1016/j.asoc.2015.11.024
Applied Soft Computing
Keywords
Field
DocType
evolutionary algorithms,network security,routing,delay tolerant network
Telecommunications network,Evolutionary algorithm,Delay-tolerant networking,Network simulation,Artificial intelligence,Distributed computing,Mathematical optimization,Attack patterns,Network security,Exploit,Mathematics,Machine learning,Network performance
Journal
Volume
Issue
ISSN
40
C
Applied Soft Computing, Volume 40, pp 416-426, 2016
Citations 
PageRank 
References 
6
0.46
17
Authors
5
Name
Order
Citations
PageRank
Doina Bucur125418.27
Giovanni Iacca260135.11
Marco Gaudesi3548.08
Giovanni Squillero4992103.07
Alberto Tonda51199.86