Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks
作者:
Highlights:
• Blackhole fast-moving attackers are effective against the First-Contact protocol.
• Flooding fast-moving attackers are effective against the Epidemic protocol.
• Mixed blackhole and flooding are effective against the Spray-and-Wait protocol.
• MaxProp is resilient; flooding attackers will mildly affect the protocol.
摘要
•Blackhole fast-moving attackers are effective against the First-Contact protocol.•Flooding fast-moving attackers are effective against the Epidemic protocol.•Mixed blackhole and flooding are effective against the Spray-and-Wait protocol.•MaxProp is resilient; flooding attackers will mildly affect the protocol.
论文关键词:Security,Mobile,Evolutionary algorithm
论文评审过程:Received 21 December 2016, Revised 14 March 2017, Accepted 15 March 2017, Available online 21 March 2017, Version of Record 25 March 2017.
论文官网地址:https://doi.org/10.1016/j.eswa.2017.03.035