Analysis of critical node attacks in mobile ad hoc networks

Dongsheng Zhang, J. Sterbenz
{"title":"Analysis of critical node attacks in mobile ad hoc networks","authors":"Dongsheng Zhang, J. Sterbenz","doi":"10.1109/RNDM.2014.7014948","DOIUrl":null,"url":null,"abstract":"Understanding network behavior under challenges is essential to constructing a resilient and survivable network. Due to the mobility and wireless channel properties, it is more difficult to model and analyze MANETs (mobile ad hoc networks) under various challenges. Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility. In this paper, we present the analysis of MANET behavior under random node failures and centrality-based attacks based on real-time topological information, and provide a comparison of network performance under complete information and real-time attacks. In addition, we adapt betweenness and closeness centrality to measure node significance in asymmetric source/sink network scenarios. The ns-3 simulator is used to examine network throughput under various intelligent attacks. By analyzing network topological properties, we provide a theoretical verification of the simulation results.","PeriodicalId":299072,"journal":{"name":"2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RNDM.2014.7014948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Understanding network behavior under challenges is essential to constructing a resilient and survivable network. Due to the mobility and wireless channel properties, it is more difficult to model and analyze MANETs (mobile ad hoc networks) under various challenges. Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility. In this paper, we present the analysis of MANET behavior under random node failures and centrality-based attacks based on real-time topological information, and provide a comparison of network performance under complete information and real-time attacks. In addition, we adapt betweenness and closeness centrality to measure node significance in asymmetric source/sink network scenarios. The ns-3 simulator is used to examine network throughput under various intelligent attacks. By analyzing network topological properties, we provide a theoretical verification of the simulation results.
移动自组网中关键节点攻击分析
了解挑战下的网络行为对于构建一个具有弹性和生存能力的网络至关重要。由于移动性和无线信道的特性,在各种挑战下,对manet(移动自组织网络)进行建模和分析变得更加困难。以前,我们基于对网络结构和移动性的先验完整知识对网络攻击进行了建模。在本文中,我们分析了随机节点故障和基于实时拓扑信息的中心性攻击下的MANET行为,并比较了完全信息和实时攻击下的网络性能。此外,我们采用中间性和接近性中心性来衡量非对称源/汇网络场景下节点的重要性。ns-3仿真器用于检测各种智能攻击下的网络吞吐量。通过对网络拓扑特性的分析,对仿真结果进行了理论验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信