Abstract
Intrusion detection in Wireless Mesh Networks (WMN) has recently emerged as an important research area. The diversity in WMN hardware and applications has generated extremely diverse network types, with diverse resource levels and system and threat models. Consequently, a variety of intrusion detection systems (IDS) have been proposed by the research community, each applicable to a specific type of WMN. Although the design and implementation of specific intrusion detection mechanisms have received considerable attention, little effort has been dedicated to the attack-and-fault tolerance of IDS themselves. In this paper we propose a taxonomy that categorizes state-of-the-art IDS solutions in WMN and we investigate the attack-and-fault tolerance of IDS in this taxonomy. We first survey a series of administrative mechanisms for attack-and-fault tolerant (AFT) IDS design. Then we propose modified designs for state-of-the-art IDS solutions that are AFT. Finally, through extensive simulations, we evaluate and compare AFT designed IDS with their original designs, with respect to the IDS performance and costs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hassanzadeh, A., Stoleru, R., Polychronakis, M., Xie, G.: RAPID: A traffic-agnostic intrusion detection for resource-constrained wireless mesh networks. Technical report, Texas A&M University 2014-1-3 (2014)
Hassanzadeh, A., Altaweel, A., Stoleru, R.: Traffic-and-resource-aware intrusion detection in wireless mesh networks. Technical report, Texas A&M University 2014-1-2 (2014)
Hassanzadeh, A., Xu, Z., Stoleru, R., Gu, G., Polychronakis, M.: PRIDE: Practical intrusion detection in resource constrained wireless mesh networks. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol. 8233, pp. 213–228. Springer, Heidelberg (2013)
Morais, A., Cavalli, A.: A distributed and collaborative intrusion detection architecture for wireless mesh networks. Mobile Networks and Applications (2013)
do Carmo, R., Hollick, M.: DogoIDS: A mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks. In: HotWiSec (2013)
Gu, Q., Zang, W., Yu, M., Liu, P.: Collaborative traffic-aware intrusion monitoring in multi-channel mesh networks. In: TrustCom (2012)
Saxena, N., Denko, M., Banerji, D.: A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Computer Communications, pp. 548 – 555 (2011)
Hassanzadeh, A., Stoleru, R., Shihada, B.: Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks. In: Frey, H., Li, X., Ruehrup, S. (eds.) ADHOC-NOW 2011. LNCS, vol. 6811, pp. 44–57. Springer, Heidelberg (2011)
Hugelshofer, F., Smith, P., Hutchison, D., Race, N.: OpenLIDS: A lightweight intrusion detection system for wireless mesh networks. In: MobiCom (2009)
Shin, D., Bagchi, S.: Optimal monitoring in multi-channel multi-radio wireless mesh networks. In: ACM MobiHoc (2009)
Glass, S., Muthukkumarasamy, V., Portmann, M.: Detecting man-in-the-middle and wormhole attacks in wireless mesh networks. In: AINA (2009)
Martignon, F., Paris, S., Capone, A.: A framework for detecting selfish misbehavior in wireless mesh community networks. In: Q2SWinet (2009)
Yu, W., Zhang, N., Fu, X., Bettati, R., Zhao, W.: Localization attacks to internet threat monitors: Modeling and countermeasures. IEEE Transactions on Computers, 1655–1668 (2010)
Bethencourt, J., Franklin, J., Vernon, M.: Mapping internet sensors with probe response attacks. In: USENIX Security (2005)
Mell, P., Marks, D., McLarnon, M.: A denial-of-service resistant intrusion detection architecture. Comput. Netw., 641–658 (2000)
Liu, H., Nayak, A., Stojmenovi, I.: Fault-tolerant algorithms/protocols in wireless sensor networks. In: Guide to Wireless Sensor Networks, Computer Communications and Networks, pp. 261–291 (2009)
Luo, X., Dong, M., Huang, Y.: On distributed fault-tolerant detection in wireless sensor networks. IEEE Transactions on Computers, 58–70 (2006)
Chenji, H., Hassanzadeh, A., Won, M., Li, Y., Zhang, W., Yang, X., Stoleru, R., Zhou, G.: A wireless sensor, adhoc and delay tolerant network system for disaster response. Technical report, LENSS-09-02 (2011)
Manikantan Shila, D., Anjali, T.: Load aware traffic engineering for mesh networks. Computer Communications, 1460–1469 (2008)
Hassanzadeh, A., Xu, Z., Stoleru, R., Gu, G.: Practical intrusion detection in resource constrained wireless mesh networks. Technical report, Texas A&M University 2012-7-1 (2012)
Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative IDS for resource constrained wireless networks. In: ICCCN (2011)
Hassanzadeh, A., Stoleru, R.: On the optimality of cooperative intrusion detection for resource constrained wireless networks. Computers & Security, 16–35 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hassanzadeh, A., Stoleru, R. (2014). On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks. In: Guo, S., Lloret, J., Manzoni, P., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2014. Lecture Notes in Computer Science, vol 8487. Springer, Cham. https://doi.org/10.1007/978-3-319-07425-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-07425-2_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07424-5
Online ISBN: 978-3-319-07425-2
eBook Packages: Computer ScienceComputer Science (R0)