2006
Karyotis, V.; Papavassiliou, S.; Maglaris, B.
Institute of Electrical and Electronics Engineers Inc., 2006, ISBN: 9783800729616, (cited By 1; Conference of 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006 ; Conference Date: 2 April 2006 Through 5 April 2006; Conference Code:114330).
Abstract | Links | BibTeX | Tags: Ad hoc networks; Internet; Mobile ad hoc networks; Multimedia systems; Network security; Stochastic systems; Telecommunication networks, Dynamic characteristics; Energy-constrained; In-depth understanding; Model and simulation; Operational characteristics; Statistical approach; Stochastic nature; Transmission radius, Wireless ad hoc networks
@conference{Karyotis2006,
title = {Modeling framework for the study and analysis of mobile attack propagation in wireless ad-hoc networks},
author = {V. Karyotis and S. Papavassiliou and B. Maglaris},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84946234997&partnerID=40&md5=d93e77cc1fd88d269d8f3741b7ab4309},
isbn = {9783800729616},
year = {2006},
date = {2006-01-01},
journal = {12th European Wireless Conference 2006 - Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006},
publisher = {Institute of Electrical and Electronics Engineers Inc.},
abstract = {Independent-operating attacks in modern communication networks have become increasingly popular, affecting significantly the performance of these networks and causing major systems to fail. In this paper, we introduce and design a modeling framework that allows for the study and analysis of mobile attack propagation in wireless ad-hoc networks. Specifically, we study probabilistically the propagation of a worm in a wireless ad-hoc network, in which an energyconstrained malicious node can move freely in the deployment region of the network. The choice of a statistical approach of the problem is motivated by the dynamic characteristics of the ad-hoc topology and the stochastic nature of the worm propagation. Through modeling and simulation, we studied and evaluated the impact of various parameters associated with the operational characteristics of the mobile attack node-such as transmission radius, mobility, energy-on an outbreak spreading and the evolution of the network, and obtained an in-depth understanding of the importance of these parameters both from the network's and the attacker's perspectives.},
note = {cited By 1; Conference of 12th European Wireless Conference on Enabling Technologies for Wireless Multimedia Communications, European Wireless 2006 ; Conference Date: 2 April 2006 Through 5 April 2006; Conference Code:114330},
keywords = {Ad hoc networks; Internet; Mobile ad hoc networks; Multimedia systems; Network security; Stochastic systems; Telecommunication networks, Dynamic characteristics; Energy-constrained; In-depth understanding; Model and simulation; Operational characteristics; Statistical approach; Stochastic nature; Transmission radius, Wireless ad hoc networks},
pubstate = {published},
tppubtype = {conference}
}
Independent-operating attacks in modern communication networks have become increasingly popular, affecting significantly the performance of these networks and causing major systems to fail. In this paper, we introduce and design a modeling framework that allows for the study and analysis of mobile attack propagation in wireless ad-hoc networks. Specifically, we study probabilistically the propagation of a worm in a wireless ad-hoc network, in which an energyconstrained malicious node can move freely in the deployment region of the network. The choice of a statistical approach of the problem is motivated by the dynamic characteristics of the ad-hoc topology and the stochastic nature of the worm propagation. Through modeling and simulation, we studied and evaluated the impact of various parameters associated with the operational characteristics of the mobile attack node-such as transmission radius, mobility, energy-on an outbreak spreading and the evolution of the network, and obtained an in-depth understanding of the importance of these parameters both from the network's and the attacker's perspectives.