dc.contributor.author |
Karyotis, V |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.contributor.author |
Grammatikou, M |
en |
dc.date.accessioned |
2014-03-01T02:50:59Z |
|
dc.date.available |
2014-03-01T02:50:59Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/35266 |
|
dc.subject |
Performance Evaluation |
en |
dc.subject |
Topology Control |
en |
dc.subject |
Wireless Ad Hoc Network |
en |
dc.subject |
Mobile Node |
en |
dc.title |
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/ICC.2007.192 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/ICC.2007.192 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the development of effective attack strategies by a malicious mobile node, based on the risk function metric, which indicates the network's vulnerability. Our approach takes on the attacker's perspective, in order to investigate the extent |
en |
heal.journalName |
IEEE International Conference on Communications |
en |
dc.identifier.doi |
10.1109/ICC.2007.192 |
en |