2006
Karyotis, V.; Papavassiliou, S.; Grammatikou, M.; Maglaris, B.
On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks Conference
Institute of Electrical and Electronics Engineers Inc., Cagliari, Sardinia, 2006, ISSN: 15301346, (cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930).
Abstract | Links | BibTeX | Tags: Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission, Energy-constrained mobile threats; Wireless ad hoc network, Intrusion detection
@conference{Karyotis200629,
title = {On the characterization and evaluation of mobile attack strategies in wireless Ad Hoc networks},
author = {V. Karyotis and S. Papavassiliou and M. Grammatikou and B. Maglaris},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-34547345829&doi=10.1109%2fISCC.2006.112&partnerID=40&md5=9ad3f3b4ab9340cfeb22ec7518d93293},
doi = {10.1109/ISCC.2006.112},
issn = {15301346},
year = {2006},
date = {2006-01-01},
journal = {Proceedings - IEEE Symposium on Computers and Communications},
pages = {29-34},
publisher = {Institute of Electrical and Electronics Engineers Inc.},
address = {Cagliari, Sardinia},
abstract = {The spread of active attacks has become a frequent cause of vast systems breakdown in modern communication networks. In this paper, we first present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The introduced formulation is used to identify and evaluate different attack strategies and approaches, which in turn can help in the development of efficient countermeasures for such attacks. Through modeling and simulation, we evaluate the impact of various parameters associated with the operational characteristics of the mobile attack node - such as transmission radius, mobility, energy - on an outbreak spreading and the evolution of the network. Furthermore, we introduce a new metric which indicates the overall infection-capability of each attack strategy and characterize their ability to harm the network according to this metric. © 2006 IEEE.},
note = {cited By 4; Conference of 11th IEEE Symposium on Computers and Communications, ISCC 2006 ; Conference Date: 26 June 2006 Through 29 June 2006; Conference Code:69930},
keywords = {Ad hoc networks; Computer simulation; Network security; Probabilistic logics; Radio transmission, Energy-constrained mobile threats; Wireless ad hoc network, Intrusion detection},
pubstate = {published},
tppubtype = {conference}
}
The spread of active attacks has become a frequent cause of vast systems breakdown in modern communication networks. In this paper, we first present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The introduced formulation is used to identify and evaluate different attack strategies and approaches, which in turn can help in the development of efficient countermeasures for such attacks. Through modeling and simulation, we evaluate the impact of various parameters associated with the operational characteristics of the mobile attack node - such as transmission radius, mobility, energy - on an outbreak spreading and the evolution of the network. Furthermore, we introduce a new metric which indicates the overall infection-capability of each attack strategy and characterize their ability to harm the network according to this metric. © 2006 IEEE.