Home > Research > Publications & Outputs > Vulnerabilities in Epidemic Forwarding
View graph of relations

Vulnerabilities in Epidemic Forwarding

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Published

Standard

Vulnerabilities in Epidemic Forwarding. / El Fawal, Alaeddine; Le Boudec, Jean-Yves; Salamatian, Kave.
2007. Paper presented at The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007).

Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Harvard

El Fawal, A, Le Boudec, J-Y & Salamatian, K 2007, 'Vulnerabilities in Epidemic Forwarding', Paper presented at The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007), 1/01/00.

APA

El Fawal, A., Le Boudec, J-Y., & Salamatian, K. (2007). Vulnerabilities in Epidemic Forwarding. Paper presented at The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007).

Vancouver

El Fawal A, Le Boudec J-Y, Salamatian K. Vulnerabilities in Epidemic Forwarding. 2007. Paper presented at The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007).

Author

El Fawal, Alaeddine ; Le Boudec, Jean-Yves ; Salamatian, Kave. / Vulnerabilities in Epidemic Forwarding. Paper presented at The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007).

Bibtex

@conference{4c0c97193689411d8e7156d5599a87ea,
title = "Vulnerabilities in Epidemic Forwarding",
abstract = "We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative methods. Thus, the existence of vulnerabilities is highly dependent on the methods used. We examine the links between them. We classify vulnerabilities into two categories: malicious and rational. We examine the effect of the attacks according to the number of attackers and the different network settings such as density, mobility and congestion. We show that malicious attacks are hard to achieve and their impacts are scenario dependent. In contrast, rational attackers always obtain a significant benefit. The evaluation is carried out using detailed realistic simulations over networks with up to 1000 nodes. We consider static scenarios, as well as vehicular networks.",
keywords = "Epidemic Forwarding, VANET, Vehicular Network, Security in Ad Hoc Network, Cheating in Ad Hoc Network, Spread Control, Inhibition, Haggle cs_eprint_id, 1675 cs_uid, 398",
author = "{El Fawal}, Alaeddine and {Le Boudec}, Jean-Yves and Kave Salamatian",
year = "2007",
language = "English",
note = "The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007) ; Conference date: 01-01-1900",

}

RIS

TY - CONF

T1 - Vulnerabilities in Epidemic Forwarding

AU - El Fawal, Alaeddine

AU - Le Boudec, Jean-Yves

AU - Salamatian, Kave

PY - 2007

Y1 - 2007

N2 - We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative methods. Thus, the existence of vulnerabilities is highly dependent on the methods used. We examine the links between them. We classify vulnerabilities into two categories: malicious and rational. We examine the effect of the attacks according to the number of attackers and the different network settings such as density, mobility and congestion. We show that malicious attacks are hard to achieve and their impacts are scenario dependent. In contrast, rational attackers always obtain a significant benefit. The evaluation is carried out using detailed realistic simulations over networks with up to 1000 nodes. We consider static scenarios, as well as vehicular networks.

AB - We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative methods. Thus, the existence of vulnerabilities is highly dependent on the methods used. We examine the links between them. We classify vulnerabilities into two categories: malicious and rational. We examine the effect of the attacks according to the number of attackers and the different network settings such as density, mobility and congestion. We show that malicious attacks are hard to achieve and their impacts are scenario dependent. In contrast, rational attackers always obtain a significant benefit. The evaluation is carried out using detailed realistic simulations over networks with up to 1000 nodes. We consider static scenarios, as well as vehicular networks.

KW - Epidemic Forwarding

KW - VANET

KW - Vehicular Network

KW - Security in Ad Hoc Network

KW - Cheating in Ad Hoc Network

KW - Spread Control

KW - Inhibition

KW - Haggle cs_eprint_id

KW - 1675 cs_uid

KW - 398

M3 - Conference paper

T2 - The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC2007)

Y2 - 1 January 1900

ER -