Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis

Kaarina Karppinen

Research output: Book/ReportBook (author)Scientificpeer-review


Practical evidence of the actual security performance of network systems is needed in order to be able to manage them in an adequate way. This study investigates whether the attack tree approach can be used for identification of the appropriate data to be measured in a mobile ad hoc network environment, and whether divergent results of attack tree analysis are obtained with different types of network protocols. The study focuses on the data transmitted in the network in connection with attacks against the Ad hoc On-demand Distance Vector protocol (AODV) and Mobile Internet Protocol version 6 (MIPv6). The network type and the protocols used in this study were chosen because of their novelty and their potential importance in future communication scenarios. Based on the results of the study, the attack tree approach is a helpful systematic method for exploring vulnerabilities. However, it is not suitable for a very detailed analysis of the attacks in the area of network protocols when applied manually. This is due to the complexity and diversity of information networks, which causes attack trees to inevitably grow uncontrollably large. Furthermore, this study shows that the results obtained by applying attack tree analyses differ depending on the protocol.
Original languageEnglish
Place of PublicationEspoo
PublisherVTT Technical Research Centre of Finland
Number of pages70
ISBN (Electronic)951-38-6672-6
ISBN (Print)951-38-6671-8
Publication statusPublished - 2005
MoE publication typeC1 Separate scientific books

Publication series

SeriesVTT Publications


  • security measurement
  • attack trees
  • mobile ad hoc networks
  • network protocols
  • network security
  • mobile internet protocol
  • data transfer
  • vulnerability
  • evaluation


Dive into the research topics of 'Security Measurement based on Attack Trees in a Mobile Ad Hoc Network Environment: Master's thesis'. Together they form a unique fingerprint.

Cite this