F. Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan
{"title":"Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks","authors":"F. Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan","doi":"10.1109/CASoN.2012.6412418","DOIUrl":null,"url":null,"abstract":"Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks launched by malicious attackers. In this paper, a mathematical model formulating an attack-defense scenario of the problem is proposed. The results show when deploying defense resources, considering hops from the core node is more useful than link degrees. With the advantage of simulations, the concept of incomplete information can be taken into account which, while increasing the difficulty of the problem, makes the problem closer to reality.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CASoN.2012.6412418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks launched by malicious attackers. In this paper, a mathematical model formulating an attack-defense scenario of the problem is proposed. The results show when deploying defense resources, considering hops from the core node is more useful than link degrees. With the advantage of simulations, the concept of incomplete information can be taken into account which, while increasing the difficulty of the problem, makes the problem closer to reality.