A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Game Theory for Wireless Engineers (Synthesis Lectures on Communications)
Game Theory for Wireless Engineers (Synthesis Lectures on Communications)
Queueing Modelling Fundamentals: With Applications in Communication Networks
Queueing Modelling Fundamentals: With Applications in Communication Networks
CISIS '08 Proceedings of the 2008 International Conference on Complex, Intelligent and Software Intensive Systems
Cross-Layer Based Anomaly Detection in Wireless Mesh Networks
SAINT '09 Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
OpenLIDS: a lightweight intrusion detection system for wireless mesh networks
Proceedings of the 15th annual international conference on Mobile computing and networking
Encyclopedia On Ad Hoc And Ubiquitous Computing: Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks
Channel-aware detection of gray hole attacks in wireless mesh networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Efficient Intrusion Detection System Model in Wireless Mesh Network
NSWCTC '10 Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Using game theory to analyze wireless ad hoc networks
IEEE Communications Surveys & Tutorials
Securing wireless mesh networks
IEEE Wireless Communications
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
A survey on wireless mesh networks
IEEE Communications Magazine
An efficient detection model of selective forwarding attacks in wireless mesh networks
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Hi-index | 0.00 |
Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find it necessary to specifically focus on this field. Another critical reason may be the difficulty in developing an effective scheme for WMNs. In fact, the structural differences among various wireless ad hoc networking technologies make it imperative to devise the mechanisms in subtle but critically different ways. For WMNs, there is a proper network backbone that is called mesh backbone (which is not present in many other wireless network counterparts), which supports the fringe part or the mesh clients. Hence, it is often possible to install the intrusion handling mechanisms or agents in the stable part and allowing some flexibility in the client or fringe parts. Nonetheless, instead of thinking in this pattern, we take a different approach of tackling intrusion by allowing an intruder to stay in the network as long as it proves to be worthy of staying in the network by supporting the network's regular activities. The idea is that by not always directly purging rogue entities, one could exploit the intruder's resources, thereby benefiting the network. We call our approach an intrusion-tackling mechanism and term it a Pay-and-Stay model. Alongside presenting the details and analysis of our model, in this paper, we also present the basics of various forms of intrusion handling in such types of networks. Using our evaluation results, we found that the model could be very effective in handling intruders and defending the network against a broad range of security attacks.