Title :
Optimal killing of nodes in a wireless malware outbreak
Author :
Khouzani, M.H.R. ; Sarkar, Saswati ; Altman, Eitan
Author_Institution :
Electr. & Syst. Eng. Dept., Univ. of Pennsylvania, Philadelphia, PA, USA
Abstract :
Malware - malicious self-replicating codes - constitute a considerable threat to the wireless computing infrastructure. Malware can be used to launch other attacks, less intrusively, violating the confidentiality or privacy, such as traffic analysis and eavesdropping. More intrusive methods may disrupt the nodes normal functions such as relaying data and establishing end-to-end routes (e.g., sinkhole attacks), or even alter the network traffic and hence destroy the integrity of the information, such as unauthorized access and session hijacking attacks.
Keywords :
Internet; authorisation; invasive software; telecommunication security; telecommunication traffic; end-to-end routes; malicious self-replicating codes; network traffic; nodes normal function; session hijacking attack; sinkhole attack; unauthorized access; wireless malware outbreak; Communication system security; Computer viruses; Computer worms; Contamination; Data security; Internet; Investments; Mathematical model; Privacy; Relays;
Conference_Titel :
Information Theory (ITW 2010, Cairo), 2010 IEEE Information Theory Workshop on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-6372-5
DOI :
10.1109/ITWKSPS.2010.5503225