The Quest for mobility models to analyse security in mobile ad hoc networks

8Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over "synthesized" mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols that could outperform existing solutions. In this work, we investigate the influence of a realistic mobility scenario over a benchmark mobility model (Random Waypoint Mobility Model), using as underlying protocol a recent solution introduced for the detection of compromised nodes. Extensive simulations show the quality of the underlying protocol. However, the main contribution is to show the relevance of the mobility model over the achieved performances, stressing out that in mobile ad-hoc networks the quality of the solution provided is satisfactory only when it can be adapted to the nodes underlying mobility model. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Conti, M., Di Pietro, R., Gabrielli, A., Mancini, L. V., & Mei, A. (2009). The Quest for mobility models to analyse security in mobile ad hoc networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5546 LNCS, pp. 85–96). https://doi.org/10.1007/978-3-642-02118-3_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free