Skip to main content

On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8487))

Abstract

Intrusion detection in Wireless Mesh Networks (WMN) has recently emerged as an important research area. The diversity in WMN hardware and applications has generated extremely diverse network types, with diverse resource levels and system and threat models. Consequently, a variety of intrusion detection systems (IDS) have been proposed by the research community, each applicable to a specific type of WMN. Although the design and implementation of specific intrusion detection mechanisms have received considerable attention, little effort has been dedicated to the attack-and-fault tolerance of IDS themselves. In this paper we propose a taxonomy that categorizes state-of-the-art IDS solutions in WMN and we investigate the attack-and-fault tolerance of IDS in this taxonomy. We first survey a series of administrative mechanisms for attack-and-fault tolerant (AFT) IDS design. Then we propose modified designs for state-of-the-art IDS solutions that are AFT. Finally, through extensive simulations, we evaluate and compare AFT designed IDS with their original designs, with respect to the IDS performance and costs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hassanzadeh, A., Stoleru, R., Polychronakis, M., Xie, G.: RAPID: A traffic-agnostic intrusion detection for resource-constrained wireless mesh networks. Technical report, Texas A&M University 2014-1-3 (2014)

    Google Scholar 

  2. Hassanzadeh, A., Altaweel, A., Stoleru, R.: Traffic-and-resource-aware intrusion detection in wireless mesh networks. Technical report, Texas A&M University 2014-1-2 (2014)

    Google Scholar 

  3. Hassanzadeh, A., Xu, Z., Stoleru, R., Gu, G., Polychronakis, M.: PRIDE: Practical intrusion detection in resource constrained wireless mesh networks. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol. 8233, pp. 213–228. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Morais, A., Cavalli, A.: A distributed and collaborative intrusion detection architecture for wireless mesh networks. Mobile Networks and Applications (2013)

    Google Scholar 

  5. do Carmo, R., Hollick, M.: DogoIDS: A mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks. In: HotWiSec (2013)

    Google Scholar 

  6. Gu, Q., Zang, W., Yu, M., Liu, P.: Collaborative traffic-aware intrusion monitoring in multi-channel mesh networks. In: TrustCom (2012)

    Google Scholar 

  7. Saxena, N., Denko, M., Banerji, D.: A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Computer Communications, pp. 548 – 555 (2011)

    Google Scholar 

  8. Hassanzadeh, A., Stoleru, R., Shihada, B.: Energy efficient monitoring for intrusion detection in battery-powered wireless mesh networks. In: Frey, H., Li, X., Ruehrup, S. (eds.) ADHOC-NOW 2011. LNCS, vol. 6811, pp. 44–57. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Hugelshofer, F., Smith, P., Hutchison, D., Race, N.: OpenLIDS: A lightweight intrusion detection system for wireless mesh networks. In: MobiCom (2009)

    Google Scholar 

  10. Shin, D., Bagchi, S.: Optimal monitoring in multi-channel multi-radio wireless mesh networks. In: ACM MobiHoc (2009)

    Google Scholar 

  11. Glass, S., Muthukkumarasamy, V., Portmann, M.: Detecting man-in-the-middle and wormhole attacks in wireless mesh networks. In: AINA (2009)

    Google Scholar 

  12. Martignon, F., Paris, S., Capone, A.: A framework for detecting selfish misbehavior in wireless mesh community networks. In: Q2SWinet (2009)

    Google Scholar 

  13. Yu, W., Zhang, N., Fu, X., Bettati, R., Zhao, W.: Localization attacks to internet threat monitors: Modeling and countermeasures. IEEE Transactions on Computers, 1655–1668 (2010)

    Google Scholar 

  14. Bethencourt, J., Franklin, J., Vernon, M.: Mapping internet sensors with probe response attacks. In: USENIX Security (2005)

    Google Scholar 

  15. Mell, P., Marks, D., McLarnon, M.: A denial-of-service resistant intrusion detection architecture. Comput. Netw., 641–658 (2000)

    Google Scholar 

  16. Liu, H., Nayak, A., Stojmenovi, I.: Fault-tolerant algorithms/protocols in wireless sensor networks. In: Guide to Wireless Sensor Networks, Computer Communications and Networks, pp. 261–291 (2009)

    Google Scholar 

  17. Luo, X., Dong, M., Huang, Y.: On distributed fault-tolerant detection in wireless sensor networks. IEEE Transactions on Computers, 58–70 (2006)

    Google Scholar 

  18. Chenji, H., Hassanzadeh, A., Won, M., Li, Y., Zhang, W., Yang, X., Stoleru, R., Zhou, G.: A wireless sensor, adhoc and delay tolerant network system for disaster response. Technical report, LENSS-09-02 (2011)

    Google Scholar 

  19. Manikantan Shila, D., Anjali, T.: Load aware traffic engineering for mesh networks. Computer Communications, 1460–1469 (2008)

    Google Scholar 

  20. Hassanzadeh, A., Xu, Z., Stoleru, R., Gu, G.: Practical intrusion detection in resource constrained wireless mesh networks. Technical report, Texas A&M University 2012-7-1 (2012)

    Google Scholar 

  21. Hassanzadeh, A., Stoleru, R.: Towards optimal monitoring in cooperative IDS for resource constrained wireless networks. In: ICCCN (2011)

    Google Scholar 

  22. Hassanzadeh, A., Stoleru, R.: On the optimality of cooperative intrusion detection for resource constrained wireless networks. Computers & Security, 16–35 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hassanzadeh, A., Stoleru, R. (2014). On the Attack-and-Fault Tolerance of Intrusion Detection Systems in Wireless Mesh Networks. In: Guo, S., Lloret, J., Manzoni, P., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2014. Lecture Notes in Computer Science, vol 8487. Springer, Cham. https://doi.org/10.1007/978-3-319-07425-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07425-2_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07424-5

  • Online ISBN: 978-3-319-07425-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics