DocumentCode :
2921712
Title :
Optimal killing of nodes in a wireless malware outbreak
Author :
Khouzani, M.H.R. ; Sarkar, Saswati ; Altman, Eitan
Author_Institution :
Electr. & Syst. Eng. Dept., Univ. of Pennsylvania, Philadelphia, PA, USA
fYear :
2010
fDate :
6-8 Jan. 2010
Firstpage :
1
Lastpage :
2
Abstract :
Malware - malicious self-replicating codes - constitute a considerable threat to the wireless computing infrastructure. Malware can be used to launch other attacks, less intrusively, violating the confidentiality or privacy, such as traffic analysis and eavesdropping. More intrusive methods may disrupt the nodes normal functions such as relaying data and establishing end-to-end routes (e.g., sinkhole attacks), or even alter the network traffic and hence destroy the integrity of the information, such as unauthorized access and session hijacking attacks.
Keywords :
Internet; authorisation; invasive software; telecommunication security; telecommunication traffic; end-to-end routes; malicious self-replicating codes; network traffic; nodes normal function; session hijacking attack; sinkhole attack; unauthorized access; wireless malware outbreak; Communication system security; Computer viruses; Computer worms; Contamination; Data security; Internet; Investments; Mathematical model; Privacy; Relays;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory (ITW 2010, Cairo), 2010 IEEE Information Theory Workshop on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-6372-5
Type :
conf
DOI :
10.1109/ITWKSPS.2010.5503225
Filename :
5503225
Link To Document :
بازگشت