Invulnerability Assessment for Mobile Ad Hoc Networks

被引:2
|
作者
Jin, Cong [1 ]
Jin, Shu-Wei [2 ]
机构
[1] Cent China Normal Univ, Dept Comp Sci, Wuhan 430079, Peoples R China
[2] Cent China Normal Univ, Wuhan 430223, Peoples R China
关键词
D O I
10.1109/PEITS.2008.69
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Usually, a mobile Ad Hoc network is confronted with four different damages: random failure, mobile attack, energy limit and selective attack. These attacks will not only destroy network topology, but also will make the transferring capacity and bandwidth of network to be influenced. An assessment of mobile Ad Hoc network invulnerability is proposed based on the characteristic of mobile Ad Hoc network. A definition of invulnerability rate is proposed. The invulnerability rate of network is decided by three factors, i.e., connectivity, transferring capacity, and bandwidth of network. At last, we give two experiments to evaluate the performance of the proposed invulnerability assessment method. The results show that mobile Ad Hoc network has the very strong invulnerability.
引用
收藏
页码:48 / +
页数:2
相关论文
共 50 条
  • [41] On the node cooperation in mobile ad hoc networks
    Al-Karaki, Jamal N.
    Bataineh, Sameer
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 61 - +
  • [42] Explicit Multicasting for Mobile Ad Hoc Networks
    Lusheng Ji
    M. Scott Corson
    Mobile Networks and Applications, 2003, 8 : 535 - 549
  • [43] Stability of hierarchical mobile ad hoc networks
    Xu, Yi
    Wang, Wenye
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1232 - 1236
  • [44] Source delay in mobile ad hoc networks
    Gao, Juntao
    Shen, Yulong
    Jiang, Xiaohong
    Li, Jie
    AD HOC NETWORKS, 2015, 24 : 109 - 120
  • [45] Scalable multicasting in mobile ad hoc networks
    Gui, C
    Mohapatra, P
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2119 - 2129
  • [46] Multimedia in wireless/mobile ad hoc networks
    Zahariadis, Theodore B.
    Doshi, Bharat T.
    IEEE WIRELESS COMMUNICATIONS, 2006, 13 (05) : 58 - 59
  • [47] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [48] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [49] A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks
    Cai, Fu
    Ming, Liu
    Jing, Chen
    Li, Zhang
    Liu, Xiao-Yang
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2011, 4 (05): : 749 - 758
  • [50] Aisle Routing for mobile ad hoc networks
    Zhang, Yikun
    Brown, Timothy X.
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2705 - 2710