On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks

Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker's perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks… (More)