Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks
Journal
2012 4th International Conference on Computational Aspects of Social Networks, CASoN 2012
Pages
297-302
Date Issued
2012
Author(s)
Abstract
Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks launched by malicious attackers. In this paper, a mathematical model formulating an attack-defense scenario of the problem is proposed. The results show when deploying defense resources, considering hops from the core node is more useful than link degrees. With the advantage of simulations, the concept of incomplete information can be taken into account which, while increasing the difficulty of the problem, makes the problem closer to reality. © 2012 IEEE.
Subjects
Honeypots; Incomplete Information; Jamming Attack; Mathematical Programming; Network Attack and Defense; Network Survivability; Resource Allocation; Wireless Mesh Networks
SDGs
Other Subjects
Honeypots; Incomplete information; Jamming attacks; Network attack; Network survivability; Jamming; Mathematical models; Mathematical programming; MESH networking; Resource allocation; Social networking (online); Wireless mesh networks (WMN); Computer crime
Type
conference paper
