By Topic

Could a Caveman Do It? The Surprising Potential of Simple Attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Perrone, L.F. ; Bucknell Univ., Lewisburg

The research projects our investigations have spawned span topics in attack modeling, quantifying the effects of attacks on network performance and robustness, and the construction of computational tools for managing our simulation experiments. We hope, however, that our work's meta-contribution is to show, by proof of concept, that you must consider simple, sideways system attacks before you can rely on a system. We encourage engineers of mission-critical systems to look for then cavemen (or squirrels) and to study carefully what actions these adversaries might take against the products they roll out. In this paper we examine simple attacks on routing protocols for wireless networks. In our study, the system was to be a wireless ad hoc network, a collection of independent, possibly mobile computing devices that communicate using radio frequency technology.

Published in:

Security & Privacy, IEEE  (Volume:5 ,  Issue: 6 )