{"title":"DCFM对不同迁移模型的有效性","authors":"Nadav Schweitzer, Ariel Stulman","doi":"10.1109/WINCOM50532.2020.9272467","DOIUrl":null,"url":null,"abstract":"Simulation based network protocol testing requires that one model reality correctly. Mis-modelling can render results invalid. Hence, one must determine the context in which a solution is to be implemented for the results to be meaningful. In this work, we investigate whether the security augmentation technique DCFM (denial contradictions with fictitious nodes) for OLSR based mobile ad-hoc networks (MANET) is valid for multiple contexts. We accomplish this by running the node isolation attack and DCFM defense on a variety of mobility models, comparing the results. We show that for most models the technique performs well, while for a specific scenario (e.g. street based) it fails. Additionally we describe the infrastructure that was built to support the street based simulations.","PeriodicalId":283907,"journal":{"name":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Effectiveness of DCFM on different mobility models\",\"authors\":\"Nadav Schweitzer, Ariel Stulman\",\"doi\":\"10.1109/WINCOM50532.2020.9272467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Simulation based network protocol testing requires that one model reality correctly. Mis-modelling can render results invalid. Hence, one must determine the context in which a solution is to be implemented for the results to be meaningful. In this work, we investigate whether the security augmentation technique DCFM (denial contradictions with fictitious nodes) for OLSR based mobile ad-hoc networks (MANET) is valid for multiple contexts. We accomplish this by running the node isolation attack and DCFM defense on a variety of mobility models, comparing the results. We show that for most models the technique performs well, while for a specific scenario (e.g. street based) it fails. Additionally we describe the infrastructure that was built to support the street based simulations.\",\"PeriodicalId\":283907,\"journal\":{\"name\":\"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WINCOM50532.2020.9272467\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Conference on Wireless Networks and Mobile Communications (WINCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WINCOM50532.2020.9272467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effectiveness of DCFM on different mobility models
Simulation based network protocol testing requires that one model reality correctly. Mis-modelling can render results invalid. Hence, one must determine the context in which a solution is to be implemented for the results to be meaningful. In this work, we investigate whether the security augmentation technique DCFM (denial contradictions with fictitious nodes) for OLSR based mobile ad-hoc networks (MANET) is valid for multiple contexts. We accomplish this by running the node isolation attack and DCFM defense on a variety of mobility models, comparing the results. We show that for most models the technique performs well, while for a specific scenario (e.g. street based) it fails. Additionally we describe the infrastructure that was built to support the street based simulations.