{"title":"Analysis of critical node attacks in mobile ad hoc networks","authors":"Dongsheng Zhang, J. Sterbenz","doi":"10.1109/RNDM.2014.7014948","DOIUrl":null,"url":null,"abstract":"Understanding network behavior under challenges is essential to constructing a resilient and survivable network. Due to the mobility and wireless channel properties, it is more difficult to model and analyze MANETs (mobile ad hoc networks) under various challenges. Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility. In this paper, we present the analysis of MANET behavior under random node failures and centrality-based attacks based on real-time topological information, and provide a comparison of network performance under complete information and real-time attacks. In addition, we adapt betweenness and closeness centrality to measure node significance in asymmetric source/sink network scenarios. The ns-3 simulator is used to examine network throughput under various intelligent attacks. By analyzing network topological properties, we provide a theoretical verification of the simulation results.","PeriodicalId":299072,"journal":{"name":"2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RNDM.2014.7014948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
Understanding network behavior under challenges is essential to constructing a resilient and survivable network. Due to the mobility and wireless channel properties, it is more difficult to model and analyze MANETs (mobile ad hoc networks) under various challenges. Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility. In this paper, we present the analysis of MANET behavior under random node failures and centrality-based attacks based on real-time topological information, and provide a comparison of network performance under complete information and real-time attacks. In addition, we adapt betweenness and closeness centrality to measure node significance in asymmetric source/sink network scenarios. The ns-3 simulator is used to examine network throughput under various intelligent attacks. By analyzing network topological properties, we provide a theoretical verification of the simulation results.