Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks

作者:

Highlights:

• Blackhole fast-moving attackers are effective against the First-Contact protocol.

• Flooding fast-moving attackers are effective against the Epidemic protocol.

• Mixed blackhole and flooding are effective against the Spray-and-Wait protocol.

• MaxProp is resilient; flooding attackers will mildly affect the protocol.

摘要

•Blackhole fast-moving attackers are effective against the First-Contact protocol.•Flooding fast-moving attackers are effective against the Epidemic protocol.•Mixed blackhole and flooding are effective against the Spray-and-Wait protocol.•MaxProp is resilient; flooding attackers will mildly affect the protocol.

论文关键词:Security,Mobile,Evolutionary algorithm

论文评审过程:Received 21 December 2016, Revised 14 March 2017, Accepted 15 March 2017, Available online 21 March 2017, Version of Record 25 March 2017.

论文官网地址:https://doi.org/10.1016/j.eswa.2017.03.035