Title: A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks

Authors: Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Vasilis Maglaris

Addresses: Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece. ' Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece. ' Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece. ' Network Management and Optimal Design Lab (NETMODE), Department of Electrical and Computer Engineering, National Technical University of Athens, Zografou, Athens 15780, Greece

Abstract: Global dissemination of information and tools for computer networks, has allowed for major system attacks affecting critical network points and resulting in significant network performance degradation. In this paper, we present a probabilistic modelling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The motivation behind this approach can be found in the topology-constrained character of the ad hoc setting, its dynamic nature and the stochastic characteristics of the interactions among the involved events. The introduced formulation is used to identify and evaluate different attack strategies and approaches. Through modelling and simulation, we evaluate the impact of various parameters associated with the operational characteristics of the mobile attacker on an outbreak spreading and the network evolution. Furthermore, a new metric, which indicates the overall infection-capability of each attack strategy is proposed and used to characterise the potential of each strategy to harm the network.

Keywords: wireless ad hoc networks; security; attack modelling; attack propagation; vulnerability analysis; wireless networks; mobile attack strategy.

DOI: 10.1504/IJSN.2006.011785

International Journal of Security and Networks, 2006 Vol.1 No.3/4, pp.255 - 265

Published online: 21 Dec 2006 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article