How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Flooding for reliable multicast in multi-hop ad hoc networks
DIALM '99 Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications
Threat Modeling
Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Mobility changes anonymity: new passive threats in mobile ad hoc networks: Research Articles
Wireless Communications & Mobile Computing - Wireless Network Security
Hi-index | 0.00 |
The increasing number of mobile devices enabled by wireless communication significantly change security issues and challenge threat modeling research in many ways. Particularly because of the vulnerability of wireless communication channels in addition to the insecure and lacking infrastructure, Mobile Ad-Hoc Networks (MANETs) require an adjusted Threat Model in contrast to the Threat Model faced when dealing with traditional networks. Moreover, mobility implicates ad-hoc routing methods to send data in an open wireless medium and facilitates adversaries in performing various attacks threatening the MANET's security. For this purpose threat modeling is employed to understand the adversary's view, to characterize the security of the system, and to identify the system's threats. In this paper we summarize and discuss protection challenges unique to Mobile Ad-Hoc Networks. We alter the Threat Model Process to Mobile Wireless Ad-Hoc Networks settings based on traditional security principles: Confidentiality, Integrity, Availability, Authentication, and Anonymity (CIAAA).