A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks

  • Authors:
  • Vasileios Karyotis;Symeon Papavassiliou;Mary Grammatikou;Vasilis Maglaris

  • Affiliations:
  • Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece.;Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece.;Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece.;Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Global dissemination of information and tools for computer networks, has allowed for major system attacks affecting critical network points and resulting in significant network performance degradation. In this paper, we present a probabilistic modelling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The motivation behind this approach can be found in the topology-constrained character of the ad hoc setting, its dynamic nature and the stochastic characteristics of the interactions among the involved events. The introduced formulation is used to identify and evaluate different attack strategies and approaches. Through modelling and simulation, we evaluate the impact of various parameters associated with the operational characteristics of the mobile attacker on an outbreak spreading and the network evolution. Furthermore, a new metric, which indicates the overall infection-capability of each attack strategy is proposed and used to characterise the potential of each strategy to harm the network.