Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over "synthesized" mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols that could outperform existing solutions. In this work, we investigate the influence of a realistic mobility scenario over a benchmark mobility model (Random Waypoint Mobility Model), using as underlying protocol a recent solution introduced for the detection of compromised nodes. Extensive simulations show the quality of the underlying protocol. However, the main contribution is to show the relevance of the mobility model over the achieved performances, stressing out that in mobile ad-hoc networks the quality of the solution provided is satisfactory only when it can be adapted to the nodes underlying mobility model. © 2009 Springer Berlin Heidelberg.

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks / Conti, M.; Di Pietro, R.; Gabrielli, Andrea; Mancini, Luigi Vincenzo; Mei, Alessandro. - 5546:(2009), pp. 85-96. (Intervento presentato al convegno 7th International Conference on Wired / Wireless Internet Communications (WWIC 2009) tenutosi a Enschede; Netherlands) [10.1007/978-3-642-02118-3_8].

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks

GABRIELLI, Andrea;MANCINI, Luigi Vincenzo;MEI, Alessandro
2009

Abstract

Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over "synthesized" mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols that could outperform existing solutions. In this work, we investigate the influence of a realistic mobility scenario over a benchmark mobility model (Random Waypoint Mobility Model), using as underlying protocol a recent solution introduced for the detection of compromised nodes. Extensive simulations show the quality of the underlying protocol. However, the main contribution is to show the relevance of the mobility model over the achieved performances, stressing out that in mobile ad-hoc networks the quality of the solution provided is satisfactory only when it can be adapted to the nodes underlying mobility model. © 2009 Springer Berlin Heidelberg.
2009
7th International Conference on Wired / Wireless Internet Communications (WWIC 2009)
Distributed protocol; Mobility models; Node capture attack detection
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks / Conti, M.; Di Pietro, R.; Gabrielli, Andrea; Mancini, Luigi Vincenzo; Mei, Alessandro. - 5546:(2009), pp. 85-96. (Intervento presentato al convegno 7th International Conference on Wired / Wireless Internet Communications (WWIC 2009) tenutosi a Enschede; Netherlands) [10.1007/978-3-642-02118-3_8].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/420651
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 8
  • ???jsp.display-item.citation.isi??? ND
social impact