{"title":"Ad Hoc和传感器网络中mac层和网络层拓扑控制恶意软件传播方案的权衡","authors":"V. Karyotis, Anastasios Kakalis, S. Papavassiliou","doi":"10.1109/SECURWARE.2009.46","DOIUrl":null,"url":null,"abstract":"Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker's perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks. The considered attack schemes are based on the topology control capabilities of wireless nodes and may be realized either at the Network layer by using node degree related information or the MAC layer by setting attackers to sleep for energy conservation purposes. To the best of our knowledge this is the first attempt to adopt the use of sleeping schedules in order to eventually increase attack efficiency. We compare the performance of the two families of strategies using both time-independent and time-dependent attack metrics. Our evaluation analysis reveals an inherent tradeoff between the two families that depends, among others, on the idle energy consumption and the network density.","PeriodicalId":382947,"journal":{"name":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks\",\"authors\":\"V. Karyotis, Anastasios Kakalis, S. Papavassiliou\",\"doi\":\"10.1109/SECURWARE.2009.46\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker's perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks. The considered attack schemes are based on the topology control capabilities of wireless nodes and may be realized either at the Network layer by using node degree related information or the MAC layer by setting attackers to sleep for energy conservation purposes. To the best of our knowledge this is the first attempt to adopt the use of sleeping schedules in order to eventually increase attack efficiency. We compare the performance of the two families of strategies using both time-independent and time-dependent attack metrics. Our evaluation analysis reveals an inherent tradeoff between the two families that depends, among others, on the idle energy consumption and the network density.\",\"PeriodicalId\":382947,\"journal\":{\"name\":\"2009 Third International Conference on Emerging Security Information, Systems and Technologies\",\"volume\":\"91 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Third International Conference on Emerging Security Information, Systems and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECURWARE.2009.46\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECURWARE.2009.46","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks
Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker's perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks. The considered attack schemes are based on the topology control capabilities of wireless nodes and may be realized either at the Network layer by using node degree related information or the MAC layer by setting attackers to sleep for energy conservation purposes. To the best of our knowledge this is the first attempt to adopt the use of sleeping schedules in order to eventually increase attack efficiency. We compare the performance of the two families of strategies using both time-independent and time-dependent attack metrics. Our evaluation analysis reveals an inherent tradeoff between the two families that depends, among others, on the idle energy consumption and the network density.