Home > Research > Publications & Outputs > Vulnerabilities in Epidemic Forwarding
View graph of relations

Vulnerabilities in Epidemic Forwarding

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  • Alaeddine El Fawal
  • Jean-Yves Le Boudec
  • Kave Salamatian
Publication date2007
<mark>Original language</mark>English
EventThe First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007) -
Duration: 1/01/1900 → …


ConferenceThe First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007)
Period1/01/00 → …


We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative methods. Thus, the existence of vulnerabilities is highly dependent on the methods used. We examine the links between them. We classify vulnerabilities into two categories: malicious and rational. We examine the effect of the attacks according to the number of attackers and the different network settings such as density, mobility and congestion. We show that malicious attacks are hard to achieve and their impacts are scenario dependent. In contrast, rational attackers always obtain a significant benefit. The evaluation is carried out using detailed realistic simulations over networks with up to 1000 nodes. We consider static scenarios, as well as vehicular networks.