dc.contributor.author |
Karyotis, V |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.contributor.author |
Grammatikou, M |
en |
dc.contributor.author |
Maglaris, B |
en |
dc.date.accessioned |
2014-03-01T02:44:07Z |
|
dc.date.available |
2014-03-01T02:44:07Z |
|
dc.date.issued |
2006 |
en |
dc.identifier.issn |
15301346 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31694 |
|
dc.subject |
Community Networks |
en |
dc.subject |
Modeling and Simulation |
en |
dc.subject |
Probabilistic Model |
en |
dc.subject |
Wireless Ad Hoc Network |
en |
dc.subject |
Operating Characteristic |
en |
dc.subject.other |
Energy-constrained mobile threats |
en |
dc.subject.other |
Wireless ad hoc network |
en |
dc.subject.other |
Ad hoc networks |
en |
dc.subject.other |
Computer simulation |
en |
dc.subject.other |
Network security |
en |
dc.subject.other |
Probabilistic logics |
en |
dc.subject.other |
Radio transmission |
en |
dc.subject.other |
Intrusion detection |
en |
dc.title |
On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ISCC.2006.112 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ISCC.2006.112 |
en |
heal.identifier.secondary |
1691003 |
en |
heal.publicationDate |
2006 |
en |
heal.abstract |
The spread of active attacks has become a frequent cause of vast systems breakdown in modern communication networks. In this paper, we first present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The introduced formulation is used to identify and evaluate different attack strategies and approaches, which in turn can help in the development of efficient countermeasures for such attacks. Through modeling and simulation, we evaluate the impact of various parameters associated with the operational characteristics of the mobile attack node - such as transmission radius, mobility, energy - on an outbreak spreading and the evolution of the network. Furthermore, we introduce a new metric which indicates the overall infection-capability of each attack strategy and characterize their ability to harm the network according to this metric. © 2006 IEEE. |
en |
heal.journalName |
Proceedings - International Symposium on Computers and Communications |
en |
dc.identifier.doi |
10.1109/ISCC.2006.112 |
en |
dc.identifier.spage |
29 |
en |
dc.identifier.epage |
34 |
en |