Mobility Investigate

Cooperative Attack and Defense in Distributed Networks

Download now Free registration required

Executive Summary

Computer networks are becoming increasingly decentralized. No single entity controls the entire system; therefore, no entity can compel compliance. Peer-to-peer file sharing systems connect users to exchange information, yet lack a hierarchical organization so they can increase efficiency and avoid single points of failure. Wireless sensor networks are assembled from large numbers of interchangeable, low-cost devices and scattered into an area of interest to perform surveillance or monitoring tasks. The opportunities and challenges presented by cooperation extend to attack and defense in distributed networks. It can be easy for attacker-controlled devices to covertly collude to carry out attacks, by sharing key material for instance.

  • Format: PDF
  • Size: 1631.9 KB