2006
DOI: 10.1504/ijsn.2006.011785
|View full text |Cite
|
Sign up to set email alerts
|

A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…Since unavailability of a percentage of the network for a time period causes reduced network operation, a combined metric for the number of infected nodes over a time interval is more suitable for the overall performance characterization. Therefore we use the Infection Efficiency I E , of an attack, which is defined as the integral of the time function of the number of infected network nodes [13] , to characterize the overall performance of an attack for a specific combination of system parameters. Intuitively, I E is the product of the number of infected network nodes in an interval by the duration of the corresponding interval, and therefore provides a combined measure of the instantaneous damage (i.e., absolute value of the number of infected nodes) and the corresponding interval that the damage takes place.…”
Section: Evaluation Metrics and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Since unavailability of a percentage of the network for a time period causes reduced network operation, a combined metric for the number of infected nodes over a time interval is more suitable for the overall performance characterization. Therefore we use the Infection Efficiency I E , of an attack, which is defined as the integral of the time function of the number of infected network nodes [13] , to characterize the overall performance of an attack for a specific combination of system parameters. Intuitively, I E is the product of the number of infected network nodes in an interval by the duration of the corresponding interval, and therefore provides a combined measure of the instantaneous damage (i.e., absolute value of the number of infected nodes) and the corresponding interval that the damage takes place.…”
Section: Evaluation Metrics and Discussionmentioning
confidence: 99%
“…The recovery process is of similar nature, but not necessarily of the same statistical type. Throughout our analysis, following current literature paradigm [8,9,13] , we assume that the arrival process of infections in each link of a legitimate node is Poisson, while the recovery process of each network node is exponentially distributed. We denote by λ i the infection arrival rate of link i and by µ j the recovery rate of node j.…”
Section: System and Network Infection Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…A similar approach, Ariadne [94], has been proposed for end-to-end authentication based on shared key pairs. Karyotis et al [95] performed a vulnerability analysis of wireless ad hoc networks through a probabilistic model. They evaluated various strategies used by attackers to launch different attacks and used simulations to analyze the impact of an attack.…”
Section: ) Other Intrusion Detection Proposalsmentioning
confidence: 99%
“…Karyotis et.al. [17] have designed a novel framework mobile attach strategy modeling and vulnerability analysis in wireless ad hoc networks.…”
Section: Security Protocolsmentioning
confidence: 99%