Invulnerability Assessment for Mobile Ad Hoc Networks

被引:2
|
作者
Jin, Cong [1 ]
Jin, Shu-Wei [2 ]
机构
[1] Cent China Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China
[2] Cent China Normal Univ, Wuhan 430223, Peoples R China
关键词
D O I
10.1109/PEITS.2008.69
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Usually, a mobile Ad Hoc network is confronted with four different damages: random failure, mobile attack, energy limit and selective attack. These attacks will not only destroy network topology, but also will make the transferring capacity and bandwidth of network to be influenced. An assessment of mobile Ad Hoc network invulnerability is proposed based on the characteristic of mobile Ad Hoc network. A definition of invulnerability rate is proposed. The invulnerability rate of network is decided by three factors, i.e., connectivity, transferring capacity, and bandwidth of network. At last, we give two experiments to evaluate the performance of the proposed invulnerability assessment method. The results show that mobile Ad Hoc network has the very strong invulnerability.
引用
收藏
页码:48 / +
页数:2
相关论文
共 50 条
  • [21] JMS on Mobile Ad Hoc Networks
    Vollset, Einar
    Ingham, Dave
    Ezhilchelvan, Paul
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2775 : 40 - 52
  • [22] Multicast in mobile ad hoc networks
    Wang, Zhijun
    Liang, Yong
    Wang, Lu
    COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE, VOL 1, 2008, 258 : 151 - 164
  • [23] JMS on mobile ad hoc networks
    Vollset, E
    Ingham, D
    Ezhilchelvan, P
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 40 - 52
  • [24] Incomplete information nodes risk assessment in mobile Ad hoc networks
    Fu, Cai
    Hong, Liang
    Peng, Bing
    Han, Lan-Sheng
    Xu, Lan-Fang
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 805 - 816
  • [25] MIPMANET -: Mobile IP for mobile ad hoc networks
    Jönsson, U
    Alriksson, F
    Larsson, T
    Johansson, P
    Maguire, GQ
    MOBIHOC: 2000 FIRST ANNUAL WORKSHOP ON MOBILE AND AD HOC NETWORKING AND COMPUTING, 2000, : 75 - 85
  • [26] Virtual mobile nodes for mobile ad hoc networks
    Dolev, S
    Gilbert, S
    Lynch, NA
    Schiller, E
    Shvartsman, AA
    Welch, JL
    DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, 3274 : 230 - 244
  • [27] Localization of mobile agents in mobile ad hoc networks
    Zafoune, Y
    Mokhtari, A
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 337 - 348
  • [28] A UAV mobile strategy in mobile ad hoc networks
    Huo, Jinhai
    Xu, Zanxin
    Zhang, Yaodong
    Shan, Xiuming
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 686 - 690
  • [29] Security in ad hoc networks: An extension of dynamic source routing in mobile ad hoc networks
    Venkataraman, Revathi
    Pushpalatha, M.
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 723 - +
  • [30] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    ELECTRONICS, 2021, 10 (04)