Abstract
Wireless Mesh Network (WMN) is an emerging heterogeneous network architecture that is growing in importance among traditional wireless communication systems as a cost-effective way of providing Internet services. However, WMNs are particularly vulnerable to malicious nodes given their inherent attributes such as decentralized infrastructure and high dependence of node cooperation. We then propose a distributed and Collaborative Intrusion Detection System (CIDS) architecture for detecting insider attacks at real-time, which comprises: i) a Routing Protocol Analyzer (RPA) to analyze the collected routing traffic and generate respective Routing Events; ii) a Distributed Intrusion Detection Engine (DIDE) that treats the Routing Events by applying Routing Constraints and calculate related Misbehaving Metrics; iii) a Cooperative Consensus Mechanism (CCM) to check the Misbehaving Metrics using a proposed threshold scheme and to track down the source of intrusion. The entire CIDS solution is implemented in a virtualized mesh network platform. The experimental results show the proposed CIDS architecture efficiently detects message fabrication attacks with good precision and low resource consumption.









Similar content being viewed by others
References
Marsch P, Raaf B, Szufarska A, Mogensen P, Hao G, Farber M et al (2012) Future mobile communication networks: challenges in the design and operation. Vehicul Technol Mag, IEEE 7(1):16–23. doi:10.1109/MVT.2011.2179343
Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw ISDN Syst 47(4):445–487. doi:10.1016/j.comnet.2004.12.001
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM (2002) A secure routing protocol for ad hoc networks. In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, 12-15 Nov. 2002 (pp. 78–87). doi:10.1109/ICNP.2002.1181388
Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1–2):21–38. doi:10.1007/s11276-004-4744-y
Zapata MG (2002) Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob Comput Commun Rev 6(3):106–107. doi:10.1145/581291.581312
Zhao S, Kent R, Aggarwal A (2013) A key management and secure routing integrated framework for mobile Ad-hoc networks. Ad Hoc Netw 11(3):1046–1061. doi:10.1016/j.adhoc.2012.11.005
Li Q, Zhao M, Walker J, Hu Y-C, Perrig A, Trappe W (2009) SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Sec Commun Netw 2(4):325–340. doi:10.1002/sec.60
Safa H, Artail H, Tabet D (2010) A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel Netw 16(4):969–984. doi:10.1007/s11276-009-0182-1
Marín-Blázquez JG, Pérez GM (2008) Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. Soft Comput 13(3):273–290. doi:10.1007/s00500-008-0322-z
Schmidt A-D, Peters F, Lamour F, Scheel C, Çamtepe SA, Albayrak S (2009) Monitoring smartphones for anomaly detection. Mob Netw Appl 14(1):92–106. doi:10.1007/s11036-008-0113-x
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N, Gritzalis S (2012) Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Sec Commun Netw 5(1):3–14. doi:10.1002/sec.341
Huang Y-A, Lee W (2004) Attack analysis and detection for Ad Hoc routing protocols. In: Jonsson E, Valdes A, Almgren M (eds) Recent advances in intrusion detection, vol 3224, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 125–145
Orset J-M, Alcalde B, Cavalli A (2005) An EFSM-based intrusion detection system for ad hoc networks. In: Peled D, Tsay Y-K (eds) Automated technology for verification and analysis, vol 3707, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 400–413
Tseng C-Y, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. Paper presented at the Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, Virginia
Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23–24):2435–2463. doi:10.1016/s1389-1286(99)00112-7
Morais A, Cavalli A (2012) A distributed intrusion detection scheme for wireless ad hoc networks. Paper presented at the Proceedings of the 27th Annual ACM Symposium on Applied Computing, Trento, Italy
Zhang Y, Lee W, Huang Y-A (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556. doi:10.1023/a:1024600519144
Zhang W, Wang Z, Das SK, Hassan M (2007) Security issues in wireless mesh networks. In: Hossain E, Leung K (eds) Wireless mesh networks. Springer, US, pp 309–330
Neumann A, Aichele C, Lindner M, Wunderlich S (2008) Better Approach To Mobile Ad-hoc Networking (B.A.T.M.A.N.) IETF Internet-Draft (expired October 2008). http://tools.ietf.org/html/draft-wunderlich-openmesh-manet-routing-00. Accessed December 2012
B.A.T.M.A.N. Advanced. http://www.open-mesh.org. Accessed December 2012
Abolhasan M, Hagelstein B, Wang JCP (2009) Real-world performance of current proactive multi-hop mesh protocols. In Communications, 2009. APCC 2009. 15th Asia-Pacific Conference on, 8–10 Oct. 2009 (pp. 44–47). doi:10.1109/APCC.2009.5375690
Friginal J, de Andrés D, Ruiz J-C, Gil P (2011) Towards benchmarking routing protocols in wireless mesh networks. Ad Hoc Netw 9(8):1374–1388. doi:10.1016/j.adhoc.2011.03.010
Morais A, Cavalli A (2012) An event-based packet dropping detection scheme for wireless mesh networks. In: Xiang Y, Lopez J, Kuo CCJ, Zhou W (eds) Cyberspace safety and security, vol 7672, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 309–323
Hartnett T (2011) Consensus-oriented decision-making: the CODM model for facilitating groups to widespread agreement: New Society
Paxson V. The bro network security monitor. http://bro-ids.org. Accessed December 2012.
Morais A, Cavalli A (2011) Detection of attacks in wireless mesh networks. In dependable computing (LADC), 2011 5th Latin-American Symposium on, 25–29 April 2011 (pp. 45–54). doi:10.1109/LADC.2011.13
Morais A, Cavalli A (2011) Route manipulation attack in wireless mesh networks. In Advanced Information Networking and Applications (AINA), 2011 I.E. International Conference on, 22–25 March 2011 (pp. 501–508). doi:10.1109/AINA.2011.11
Bellard F. QEMU - open source machine emulator and virtualizer. http://wiki.qemu.org. Accessed December 2012
Virtual Distributed ethernet switch. http://wiki.virtualsquare.org/wiki/index.php/VDE. Accessed December 2012
Jemec M. PackETH - Ethernet packet generator. http://packeth.sourceforge.net/sourceforge. Accessed December 2012
Sysstat - Performance monitoring tools for Linux. http://sebastien.godard.pagesperso-orange.fr/. Accessed December 2012
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. Paper presented at the Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, Massachusetts, United States
Hao Y, Shu J, Xiaoqiao M, Songwu L (2006) SCAN: self-organized network-layer security in mobile ad hoc networks. Select Areas Commun, IEEE J 24(2):261–273. doi:10.1109/JSAC.2005.861384
Komninos N, Douligeris C (2009) LIDF: layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw 7(1):171–182. doi:10.1016/j.adhoc.2008.01.001
Saxena N, Denko M, Banerji D (2011) A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Comput Commun 34(4):548–555. doi:10.1016/j.comcom.2010.04.040
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Morais, A., Cavalli, A. A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks. Mobile Netw Appl 19, 101–120 (2014). https://doi.org/10.1007/s11036-013-0457-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-013-0457-8