Title :
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks
Author :
Karyotis, Vasileios ; Kakalis, Anastasios ; Papavassiliou, Symeon
Author_Institution :
Sch. of Electr. & Comput. Eng., Nat. Tech. Univ. of Athens (NTUA), Athens, Greece
Abstract :
Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker´s perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks. The considered attack schemes are based on the topology control capabilities of wireless nodes and may be realized either at the network layer by using node degree related information or the MAC layer by setting attackers to sleep for energy conservation purposes. To the best of our knowledge this is the first attempt to adopt the use of sleeping schedules in order to eventually increase attack efficiency. We compare the performance of the two families of strategies using both time-independent and time-dependent attack metrics. Our evaluation analysis reveals an inherent tradeoff between the two families that depends, among others, on the idle energy consumption and the network density.
Keywords :
access protocols; ad hoc networks; energy conservation; energy consumption; invasive software; telecommunication network topology; wireless sensor networks; MAC layer; ad hoc networks; attack metrics; energy conservation; energy consumption; malicious software; malware spreading schemes; network layer topology; probabilistic framework; sensor networks; wireless networks; Computer networks; Computer security; Energy conservation; Energy consumption; Information security; National security; Network topology; Protocols; Sensor systems; Wireless sensor networks; closed queuing networks; malware spreading; topology control attacks;
Conference_Titel :
Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on
Conference_Location :
Athens, Glyfada
Print_ISBN :
978-0-7695-3668-2
DOI :
10.1109/SECURWARE.2009.46