Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Intrusion detection using a linguistic hedged fuzzy-XCS classifier system
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special Issue on Evolutionary and Metaheuristics based Data Mining (EMBDM); Guest Editors: José A. Gámez, María J. del Jesús, José M. Puerta
Monitoring smartphones for anomaly detection
Mobile Networks and Applications
Real-world performance of current proactive multi-hop mesh protocols
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
Route Manipulation Attack in Wireless Mesh Networks
AINA '11 Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications
Towards benchmarking routing protocols in wireless mesh networks
Ad Hoc Networks
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
A distributed intrusion detection scheme for wireless ad hoc networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
An event-based packet dropping detection scheme for wireless mesh networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
Wireless Mesh Network (WMN) is an emerging heterogeneous network architecture that is growing in importance among traditional wireless communication systems as a cost-effective way of providing Internet services. However, WMNs are particularly vulnerable to malicious nodes given their inherent attributes such as decentralized infrastructure and high dependence of node cooperation. We then propose a distributed and Collaborative Intrusion Detection System (CIDS) architecture for detecting insider attacks at real-time, which comprises: i) a Routing Protocol Analyzer (RPA) to analyze the collected routing traffic and generate respective Routing Events; ii) a Distributed Intrusion Detection Engine (DIDE) that treats the Routing Events by applying Routing Constraints and calculate related Misbehaving Metrics; iii) a Cooperative Consensus Mechanism (CCM) to check the Misbehaving Metrics using a proposed threshold scheme and to track down the source of intrusion. The entire CIDS solution is implemented in a virtualized mesh network platform. The experimental results show the proposed CIDS architecture efficiently detects message fabrication attacks with good precision and low resource consumption.