dc.contributor.author |
Karyotis, V |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.date.accessioned |
2014-03-01T01:27:04Z |
|
dc.date.available |
2014-03-01T01:27:04Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.issn |
1389-1286 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/18329 |
|
dc.subject |
Attack modeling |
en |
dc.subject |
Mobile ad hoc networks |
en |
dc.subject |
QoS |
en |
dc.subject |
Security |
en |
dc.subject |
Topology control |
en |
dc.subject.classification |
Computer Science, Hardware & Architecture |
en |
dc.subject.classification |
Computer Science, Information Systems |
en |
dc.subject.classification |
Engineering, Electrical & Electronic |
en |
dc.subject.classification |
Telecommunications |
en |
dc.subject.other |
Algorithms |
en |
dc.subject.other |
Computer simulation |
en |
dc.subject.other |
Probabilistic logics |
en |
dc.subject.other |
Quality of service |
en |
dc.subject.other |
Security of data |
en |
dc.subject.other |
Topology |
en |
dc.subject.other |
Attack modeling |
en |
dc.subject.other |
Probabilistic attack modeling |
en |
dc.subject.other |
Topology control |
en |
dc.subject.other |
Ad hoc networks |
en |
dc.title |
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework |
en |
heal.type |
journalArticle |
en |
heal.identifier.primary |
10.1016/j.comnet.2007.01.028 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1016/j.comnet.2007.01.028 |
en |
heal.language |
English |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
In this paper, we introduce and design a modeling framework that allows for the study and analysis of attack propagation in mobile ad hoc networks. The choice of a statistical approach for the problem is motivated by the dynamic characteristics of the ad hoc topology and the stochastic nature of threat propagation. Based on this probabilistic modeling framework, we study the impact of topology and mobility in the propagation of software threats over ad hoc networks. We design topology control algorithms that indicate how to properly adjust an attacker's transmission radius, according to the measured topological characteristics and availability of its resources, in the process of infecting a network more effectively. Then based on these topology control algorithms we develop different attack strategies that may range from independent attacks to cooperative scenarios in order to increase the negative impact of an attack on the network. Our performance evaluation results demonstrate that the proposed topology control algorithms and respective attack strategies effectively balance the tradeoffs between the potential network damage and the attackers' lifetime, and as a result significantly outperform any other flat and threshold-based approaches. (C) 2007 Elsevier B.V. All rights reserved. |
en |
heal.publisher |
ELSEVIER SCIENCE BV |
en |
heal.journalName |
Computer Networks |
en |
dc.identifier.doi |
10.1016/j.comnet.2007.01.028 |
en |
dc.identifier.isi |
ISI:000246834300017 |
en |
dc.identifier.volume |
51 |
en |
dc.identifier.issue |
9 |
en |
dc.identifier.spage |
2397 |
en |
dc.identifier.epage |
2410 |
en |