Vector quantization and signal compression
Vector quantization and signal compression
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
Proceedings of the 11th annual international conference on Mobile computing and networking
Convergence of the Lloyd Algorithm for Computing Centroidal Voronoi Tessellations
SIAM Journal on Numerical Analysis
Troubleshooting wireless mesh networks
ACM SIGCOMM Computer Communication Review
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
On achieving cost-sensitive anomaly detection and response in mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Securing wireless mesh networks
IEEE Wireless Communications
Self-policing mobile ad hoc networks by reputation systems
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Mobility in collaborative alert systems: building trust through reputation
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Short paper: can your phone trust your friend selection?
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
LFTM, linguistic fuzzy trust mechanism for distributed networks
Concurrency and Computation: Practice & Experience
Journal of Network and Systems Management
Hi-index | 0.00 |
As one of the backup measures of intrusion prevention techniques, intrusion detection plays a paramount role in the second defense line of computer networks. Intrusion detection in wireless mesh networks (WMNs) is especially challenging and requires particular design concerns due to their special infrastructure and communication mode. In this paper, we propose a novel anomaly detection system, termed RADAR, to detect and handle anomalous mesh nodes in wireless mesh networks. Specifically, reputation is introduced to characterize and quantify a node's behavior in terms of fine-grained performance metrics of interest. The dual-core detection engine of RADAR then explores spatio-temporal property of such behavior to manifest the deviation between that of normal and anomalous nodes. Although the current RADAR prototype is only implemented with routing protocols, the design architecture allows it to be easily extended to cross-layer anomaly detection where anomalous events occur at different layers and can be resulted by either intentional intrusion or accidental network failure. The simulation results demonstrate that RADAR can achieve high detection accuracy, low computational complexity, and low false positive rate.