HEAL DSpace

On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Karyotis, V en
dc.contributor.author Papavassiliou, S en
dc.contributor.author Grammatikou, M en
dc.contributor.author Maglaris, B en
dc.date.accessioned 2014-03-01T02:44:07Z
dc.date.available 2014-03-01T02:44:07Z
dc.date.issued 2006 en
dc.identifier.issn 15301346 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/31694
dc.subject Community Networks en
dc.subject Modeling and Simulation en
dc.subject Probabilistic Model en
dc.subject Wireless Ad Hoc Network en
dc.subject Operating Characteristic en
dc.subject.other Energy-constrained mobile threats en
dc.subject.other Wireless ad hoc network en
dc.subject.other Ad hoc networks en
dc.subject.other Computer simulation en
dc.subject.other Network security en
dc.subject.other Probabilistic logics en
dc.subject.other Radio transmission en
dc.subject.other Intrusion detection en
dc.title On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks en
heal.type conferenceItem en
heal.identifier.primary 10.1109/ISCC.2006.112 en
heal.identifier.secondary http://dx.doi.org/10.1109/ISCC.2006.112 en
heal.identifier.secondary 1691003 en
heal.publicationDate 2006 en
heal.abstract The spread of active attacks has become a frequent cause of vast systems breakdown in modern communication networks. In this paper, we first present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The introduced formulation is used to identify and evaluate different attack strategies and approaches, which in turn can help in the development of efficient countermeasures for such attacks. Through modeling and simulation, we evaluate the impact of various parameters associated with the operational characteristics of the mobile attack node - such as transmission radius, mobility, energy - on an outbreak spreading and the evolution of the network. Furthermore, we introduce a new metric which indicates the overall infection-capability of each attack strategy and characterize their ability to harm the network according to this metric. © 2006 IEEE. en
heal.journalName Proceedings - International Symposium on Computers and Communications en
dc.identifier.doi 10.1109/ISCC.2006.112 en
dc.identifier.spage 29 en
dc.identifier.epage 34 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής