Capacity of Ad Hoc wireless networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Mobility increases the capacity of ad hoc wireless networks
IEEE/ACM Transactions on Networking (TON)
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
On the behavior of communication links of a node in a multi-hop mobile environment
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Modeling path duration distributions in MANETs and their impact on reactive routing protocols
IEEE Journal on Selected Areas in Communications
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
Hi-index | 0.00 |
We present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and countermeasures on MANETs. In particular, we focus on the packet loss that can be charged to the misbehavior as well as to the countermeasures as a primary metric. For this, we model the entire chain of (1) MANET routing, (2) attack, (3) intrusion detection, and (4) intrusion response. We validate the models proposed by means of simulation.