2007
Karyotis, V.; Papavassiliou, S.; Grammatikou, M.
On the risk-based operation of mobile attacks in wireless ad hoc networks Conference
Glasgow, Scotland, 2007, ISSN: 05361486, (cited By 3; Conference of 2007 IEEE International Conference on Communications, ICC'07 ; Conference Date: 24 June 2007 Through 28 June 2007; Conference Code:71262).
Abstract | Links | BibTeX | Tags: Ad hoc networks; Computer software; Network management; Risk analysis; Topology, Network countermeasures; Risk function metrics; Topology control, Network security
@conference{Karyotis20071130,
title = {On the risk-based operation of mobile attacks in wireless ad hoc networks},
author = {V. Karyotis and S. Papavassiliou and M. Grammatikou},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-38549150430&doi=10.1109%2fICC.2007.192&partnerID=40&md5=9901cf2ecad38b04584e107952cd7393},
doi = {10.1109/ICC.2007.192},
issn = {05361486},
year = {2007},
date = {2007-01-01},
journal = {IEEE International Conference on Communications},
pages = {1130-1135},
address = {Glasgow, Scotland},
abstract = {In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the development of effective attack strategies by a malicious mobile node, based on the risk function metric, which indicates the network's vulnerability. Our approach takes on the attacker's perspective, in order to investigate the extent of its attack potentials, which in turn could be used for the effective design of network countermeasures. Our performance evaluation results demonstrate that the proposed risk-based topology control algorithms and respective attack strategies effectively balance the tradeoffs between the potential network damage and the attacker's lifetime, and as a result significantly outperform any other flat and threshold-based approaches. © 2007 IEEE.},
note = {cited By 3; Conference of 2007 IEEE International Conference on Communications, ICC'07 ; Conference Date: 24 June 2007 Through 28 June 2007; Conference Code:71262},
keywords = {Ad hoc networks; Computer software; Network management; Risk analysis; Topology, Network countermeasures; Risk function metrics; Topology control, Network security},
pubstate = {published},
tppubtype = {conference}
}
In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the development of effective attack strategies by a malicious mobile node, based on the risk function metric, which indicates the network's vulnerability. Our approach takes on the attacker's perspective, in order to investigate the extent of its attack potentials, which in turn could be used for the effective design of network countermeasures. Our performance evaluation results demonstrate that the proposed risk-based topology control algorithms and respective attack strategies effectively balance the tradeoffs between the potential network damage and the attacker's lifetime, and as a result significantly outperform any other flat and threshold-based approaches. © 2007 IEEE.