Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set

Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou
{"title":"Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set","authors":"Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou","doi":"10.1109/IMIS.2015.33","DOIUrl":null,"url":null,"abstract":"As a special kind of attack, the node compromise attack destroy security, reliability and confidentiality of ad-hoc networks. However, previous research paid little attention on developing general attacking models, which are fundamentals for designing network security mechanisms. In this paper, we approach node compromise attack formalizing problem from an adversarial view and present a general attacking model based on invading virtual backbones of network, which is constructed based on Weakly Connected Dominating Set (WCDS). To investigate the features of our scheme, simulations are conducted to illustrate the influences of infection ratio to network performance. Analysis and simulations results showed that bigger infection ratio can reduce set of compromised nodes, enhance attacking efficiency, save resource expenditure and shorten attacking time.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"157 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2015.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

As a special kind of attack, the node compromise attack destroy security, reliability and confidentiality of ad-hoc networks. However, previous research paid little attention on developing general attacking models, which are fundamentals for designing network security mechanisms. In this paper, we approach node compromise attack formalizing problem from an adversarial view and present a general attacking model based on invading virtual backbones of network, which is constructed based on Weakly Connected Dominating Set (WCDS). To investigate the features of our scheme, simulations are conducted to illustrate the influences of infection ratio to network performance. Analysis and simulations results showed that bigger infection ratio can reduce set of compromised nodes, enhance attacking efficiency, save resource expenditure and shorten attacking time.
攻击弱连通支配集危及Ad-Hoc网络
节点妥协攻击作为一种特殊的攻击类型,破坏了ad-hoc网络的安全性、可靠性和保密性。然而,以往的研究很少关注通用攻击模型的开发,而通用攻击模型是设计网络安全机制的基础。本文从对抗的角度探讨了节点妥协攻击的形式化问题,提出了一种基于弱连通支配集(WCDS)构造的基于入侵网络虚拟骨干网的通用攻击模型。为了研究该方案的特点,进行了仿真,以说明感染率对网络性能的影响。分析和仿真结果表明,较大的感染率可以减少受损节点集,提高攻击效率,节省资源消耗,缩短攻击时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信