The security of mobile wireless ad hoc networks is a multifaceted
topic which in recent years has been the focus of much interest in
the research community. While many security issues in these networks
can be addressed by protocol design, wireless nodes have inherent
physical vulnerabilities that can be exploited by attackers to cause
disruptions in network traffic. The nature of these exposures is
such that there is little that can be done to eliminate them leaving
the network open to denial of service and reduction of quality attacks.
It is essential that the impact of such attacks is well-understood
before wireless ad hoc networks are used in mission-critical applications.
This paper is a step in this risk analysis as our experiments quantify
the effects of attacks that exploit physical vulnerabilities. Our
contributions in this paper are two fold. First, we introduce a general
model that can be used to characterize a physical attack as an on-off
process and then we apply this model to two specific attack scenarios.
Second, we present the results of a simulation study with these two
attack scenarios in the context of a mesh of network nodes using
the IEEE 802.11 standard and the AODV routing protocol
%0 Conference Paper
%1 Perrone06
%A Perrone, L.F.
%A Nelson, S.C.
%B Operator-Assisted (Wireless Mesh) Community Networks, 2006 1st Workshop
on
%D 2006
%K IEEE_802.11_standard network_mesh_node network_traffic telecommunication_traffic protocol ad-hoc network attack mobile radio security telecommunication model on-off AODV routing MANET denial-of-service
%P 1 -10
%R 10.1109/WOACN.2006.337180
%T A Study of On-Off Attack Models for Wireless Ad Hoc Networks
%X The security of mobile wireless ad hoc networks is a multifaceted
topic which in recent years has been the focus of much interest in
the research community. While many security issues in these networks
can be addressed by protocol design, wireless nodes have inherent
physical vulnerabilities that can be exploited by attackers to cause
disruptions in network traffic. The nature of these exposures is
such that there is little that can be done to eliminate them leaving
the network open to denial of service and reduction of quality attacks.
It is essential that the impact of such attacks is well-understood
before wireless ad hoc networks are used in mission-critical applications.
This paper is a step in this risk analysis as our experiments quantify
the effects of attacks that exploit physical vulnerabilities. Our
contributions in this paper are two fold. First, we introduce a general
model that can be used to characterize a physical attack as an on-off
process and then we apply this model to two specific attack scenarios.
Second, we present the results of a simulation study with these two
attack scenarios in the context of a mesh of network nodes using
the IEEE 802.11 standard and the AODV routing protocol
@inproceedings{Perrone06,
abstract = {The security of mobile wireless ad hoc networks is a multifaceted
topic which in recent years has been the focus of much interest in
the research community. While many security issues in these networks
can be addressed by protocol design, wireless nodes have inherent
physical vulnerabilities that can be exploited by attackers to cause
disruptions in network traffic. The nature of these exposures is
such that there is little that can be done to eliminate them leaving
the network open to denial of service and reduction of quality attacks.
It is essential that the impact of such attacks is well-understood
before wireless ad hoc networks are used in mission-critical applications.
This paper is a step in this risk analysis as our experiments quantify
the effects of attacks that exploit physical vulnerabilities. Our
contributions in this paper are two fold. First, we introduce a general
model that can be used to characterize a physical attack as an on-off
process and then we apply this model to two specific attack scenarios.
Second, we present the results of a simulation study with these two
attack scenarios in the context of a mesh of network nodes using
the IEEE 802.11 standard and the AODV routing protocol},
added-at = {2011-07-15T15:18:02.000+0200},
author = {Perrone, L.F. and Nelson, S.C.},
biburl = {https://www.bibsonomy.org/bibtex/202c74319c3fd5319f51aa2e18b9f12d8/msteele},
booktitle = {Operator-Assisted (Wireless Mesh) Community Networks, 2006 1st Workshop
on},
doi = {10.1109/WOACN.2006.337180},
interhash = {296fce8ec4f0a3e77888ec642ca905f1},
intrahash = {02c74319c3fd5319f51aa2e18b9f12d8},
keywords = {IEEE_802.11_standard network_mesh_node network_traffic telecommunication_traffic protocol ad-hoc network attack mobile radio security telecommunication model on-off AODV routing MANET denial-of-service},
month = {sept. },
owner = {msteele},
pages = {1 -10},
review = {Proposes an On-Off modeling for attacker modeling. This article is
more concerned with performance in the face of MANET routing attacks.},
timestamp = {2011-07-15T20:23:32.000+0200},
title = {{A Study of On-Off Attack Models for Wireless Ad Hoc Networks}},
year = 2006
}