We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative methods. Thus, the existence of vulnerabilities is highly dependent on the methods used. We examine the links between them. We classify vulnerabilities into two categories: malicious and rational. We examine the effect of the attacks according to the number of attackers and the different network settings such as density, mobility and congestion. We show that malicious attacks are hard to achieve and their impacts are scenario dependent. In contrast, rational attackers always obtain a sign...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
In this paper, we investigate the effect of mobility constraints on epidemic broadcast mechanisms in...
Security has become the main concern to grant protected communication between mobile nodes in an unf...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Emerging pervasive wireless networks, pocket switched networks, Internet of things, vehicular networ...
International audienceIf deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside...
In this paper, we will implement two attacks over mobile ad hoc networks known as Wormhole attack an...
In this paper, we study the malware propagation issue in wireless networks, considering the features...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...
Ad-hoc wireless networks are an exciting research direction in sensing and pervasive computing. Adva...
Intrusion/misbehavior detection and response are two important components for defending against vari...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Ad hoc networking is a new paradigm of wireless commu- nications for mobile nodes. Mobile ad hoc net...
Accurate malware propagation modeling in wireless ad hoc networks (WANETs) represents a fundamental ...
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wirele...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
In this paper, we investigate the effect of mobility constraints on epidemic broadcast mechanisms in...
Security has become the main concern to grant protected communication between mobile nodes in an unf...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ...
Emerging pervasive wireless networks, pocket switched networks, Internet of things, vehicular networ...
International audienceIf deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside...
In this paper, we will implement two attacks over mobile ad hoc networks known as Wormhole attack an...
In this paper, we study the malware propagation issue in wireless networks, considering the features...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...
Ad-hoc wireless networks are an exciting research direction in sensing and pervasive computing. Adva...
Intrusion/misbehavior detection and response are two important components for defending against vari...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Ad hoc networking is a new paradigm of wireless commu- nications for mobile nodes. Mobile ad hoc net...
Accurate malware propagation modeling in wireless ad hoc networks (WANETs) represents a fundamental ...
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wirele...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
In this paper, we investigate the effect of mobility constraints on epidemic broadcast mechanisms in...
Security has become the main concern to grant protected communication between mobile nodes in an unf...