Neural recognition of human pointing gestures in real images
Neural Processing Letters
Ad hoc on-demand multipath distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Defending against Sybil Attacks in Sensor Networks
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Hybrid intelligent systems for network security
Proceedings of the 44th annual Southeast regional conference
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Securing distributed data storage and retrieval in sensor networks
Pervasive and Mobile Computing
Nonparametri information fusion for motion estimation
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
One of the most important problems of WMNs, that is even preventing them from being used in many sensitive applications, is the lack of security. To ensure security of WMNs, two strategies need to be adopted: embedding security mechanisms into the network protocols, and developing efficient intrusion detection and reaction systems. To date, many secure protocols have been proposed, but their role of defending attacks is very limited. We present a framework for intrusion detection in WMNs that is orthogonal to the network protocols. It is based on a reputation system, that allows to isolate ill-behaved nodes by rating their reputation as low, and distributed agents based on unsupervised learning algorithms (self-organizing maps), that are able to detect deviations from the normal behavior. An additional advantage of this approach is that it is quite independent of the attacks, and therefore it can detect and confine new, previously unknown, attacks. Unlike previous approaches, and due to the inherent insecurity of WMN nodes, we assume that confidentiality and integrity cannot be preserved for any single node.