Title : 
Optimal killing of nodes in a wireless malware outbreak
         
        
            Author : 
Khouzani, M.H.R. ; Sarkar, Saswati ; Altman, Eitan
         
        
            Author_Institution : 
Electr. & Syst. Eng. Dept., Univ. of Pennsylvania, Philadelphia, PA, USA
         
        
        
        
        
        
            Abstract : 
Malware - malicious self-replicating codes - constitute a considerable threat to the wireless computing infrastructure. Malware can be used to launch other attacks, less intrusively, violating the confidentiality or privacy, such as traffic analysis and eavesdropping. More intrusive methods may disrupt the nodes normal functions such as relaying data and establishing end-to-end routes (e.g., sinkhole attacks), or even alter the network traffic and hence destroy the integrity of the information, such as unauthorized access and session hijacking attacks.
         
        
            Keywords : 
Internet; authorisation; invasive software; telecommunication security; telecommunication traffic; end-to-end routes; malicious self-replicating codes; network traffic; nodes normal function; session hijacking attack; sinkhole attack; unauthorized access; wireless malware outbreak; Communication system security; Computer viruses; Computer worms; Contamination; Data security; Internet; Investments; Mathematical model; Privacy; Relays;
         
        
        
        
            Conference_Titel : 
Information Theory (ITW 2010, Cairo), 2010 IEEE Information Theory Workshop on
         
        
            Conference_Location : 
Cairo
         
        
            Print_ISBN : 
978-1-4244-6372-5
         
        
        
            DOI : 
10.1109/ITWKSPS.2010.5503225