Invulnerability Assessment for Mobile Ad Hoc Networks

被引:2
|
作者
Jin, Cong [1 ]
Jin, Shu-Wei [2 ]
机构
[1] Cent China Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China
[2] Cent China Normal Univ, Wuhan 430223, Peoples R China
关键词
D O I
10.1109/PEITS.2008.69
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Usually, a mobile Ad Hoc network is confronted with four different damages: random failure, mobile attack, energy limit and selective attack. These attacks will not only destroy network topology, but also will make the transferring capacity and bandwidth of network to be influenced. An assessment of mobile Ad Hoc network invulnerability is proposed based on the characteristic of mobile Ad Hoc network. A definition of invulnerability rate is proposed. The invulnerability rate of network is decided by three factors, i.e., connectivity, transferring capacity, and bandwidth of network. At last, we give two experiments to evaluate the performance of the proposed invulnerability assessment method. The results show that mobile Ad Hoc network has the very strong invulnerability.
引用
收藏
页码:48 / +
页数:2
相关论文
共 50 条
  • [31] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [32] A Friend Mechanism for Mobile Ad Hoc Networks
    Razak, Shukor Abd
    Samian, Normalia
    Ma'arof, Mohd. Aizaini
    Furnell, S. M.
    Clarke, N. L.
    Brooke, P. J.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 440 - 448
  • [33] On the reliability of ODMRP in mobile ad hoc networks
    Sobeih, A
    Baraka, H
    Fahmy, A
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 307 - 308
  • [34] Overcoming fragmentation in mobile ad hoc networks
    Briesemeister, L
    Hommel, G
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2000, 2 (03) : 182 - 187
  • [35] Equational Reasoning on Mobile Ad Hoc Networks
    Ghassemi, Fatemeh
    Fokkink, Wan
    Movaghar, Ali
    FUNDAMENTA INFORMATICAE, 2010, 105 (04) : 375 - 415
  • [36] Service discovery in mobile ad hoc networks
    Fan, Z
    Ho, EG
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 457 - 459
  • [37] On optimal performance in mobile ad hoc networks
    Patra, T. K.
    Kuri, J.
    Nuggehalli, P.
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 404 - +
  • [38] A Multipath Routing for Mobile Ad Hoc Networks
    Zheng Sihai
    Li Layuan
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 355 - 358
  • [39] Securing Ad Hoc networks by mobile firewall
    Yi, Ping
    Wu, Yue
    Li, Jianhua
    Journal of Information and Computational Science, 2007, 4 (02): : 839 - 850
  • [40] Group communications in mobile ad hoc networks
    Mohapatra, P
    Gui, C
    Li, J
    COMPUTER, 2004, 37 (02) : 52 - +