Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Adaptive link-state routing and intrusion detection in wireless mesh networks

Adaptive link-state routing and intrusion detection in wireless mesh networks

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Security in wireless mesh networks (WMNs) has always been a major concern ever since the existence of these networks. The open medium and the lack of physical security make the WMNs susceptible to various kinds of attacks. This study addresses the problem of intrusion detection in WMNs. The authors propose a routing protocol that is capable of detecting intrusions, while undertaking the tasks of routing in WMNs. The authors base the routing tasks in the existing protocol on the existing optimised link-state routing protocol. This protocol uses the sampling mechanism for the detection of malicious information in the network. Concepts of learning automata have been introduced to optimise the sampling process. Two new frame formats and its associated handling procedures have been developed. The authors evaluated the performance of our protocol using network simulator 3. In the experiments performed, the highest achieved intrusion detection rate with the proposed protocol was observed to be 94%.

References

    1. 1)
      • Zhang, Z., Nait-Abdesselam, F., Ho, P.H., Lin, X.: `RADAR: a reputation-based scheme for detecting anomalous nodes in wireless mesh networks', Proc. WCNC, 2008, p. 2621–2626.
    2. 2)
      • P. Nicopolitidis , G.I. Papadimitriou , A.S. Pomportsis . Learning automata-based polling protocols for wireless LANs. IEEE Trans. Commun. , 3 , 453 - 463
    3. 3)
      • R. Chandrasekar , S. Misra , M.S. Obaidat . FORK: a novel strategy for an agent-based intrusion detection scheme in mobile ad hoc networks. Comput. Commun. , 16 , 3855 - 3869
    4. 4)
      • R. Chandrasekar , M.S. Obaidat , S. Misra , F. Peña-Mora . A secure data-centric scheme for group-based routing in heterogeneous ad hoc sensor networks and its simulation analysis. SIMULATION: Trans. Soc. Model. Simul. Int. , 23 , 131 - 146
    5. 5)
      • Misra, S., Krishna, P.V., Abraham, K.I.: `S-LAID: a simple learning automata-based solution for intrusion detection in wireless sensor networks', Communicated to Wireless Communications and Mobile Computing (WCMC), 2010.
    6. 6)
      • C. Loo , M. Ng , C. Leckie , M. Palaniswami . Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. , 4 , 313 - 332
    7. 7)
      • I.F. Akyildiz , X. Wang , W. Wang . Wireless mesh networks: a survey. Comput. Netw. , 4 , 445 - 487
    8. 8)
      • S. Misra , K.I. Abraham , M.S. Obaidat , P.V. Krishna . LAID: a learning automata-based approach for intrusion detection in wireless sensor networks. Secur. Commun. Netw. , 2 , 215 - 224
    9. 9)
      • A. Fourati , K.A. Agha . (2006) A shared secret-based algorithm for securing the OLSR routing protocol.
    10. 10)
      • S. Glass , M. Portmann , V. Muthukkumarasamy . Securing wireless mesh networks. IEEE Internet Comput. , 4 , 30 - 36
    11. 11)
      • K.S. Narendra , M.A.L. Thathachar . (1989) Learning automata.
    12. 12)
      • Kodialam, M., Lakshman, T.V.: `Detecting network intrusion via sampling: a game theoretic approach', Proc. IEEE INFOCOM, 2003.
    13. 13)
      • J. Clausen . OLSR.
    14. 14)
      • A. Shamir . How to share a secret. Commun. ACM , 11 , 612 - 613
    15. 15)
      • NS3: Network Simulator 3, http://www.nsnam.org/.
    16. 16)
      • S. Banerjee , C. Grosan , A. Abraham , P. Mahanti . Intrusion detection on sensor networks using emotional ants. Int. J. Appl. Sci. Comput. , 3 , 152 - 173
    17. 17)
      • M. Esnaashari , M.R. Meybodi . Data aggregation in sensor networks using learning automata. Wirel. Netw. , 687 - 699
    18. 18)
      • S. Misra , V. Tiwari , M.S. Obaidat . LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks. IEEE J. Sel. Areas Commun. , 4 , 466 - 479
    19. 19)
      • S. Misra , B.J. Oommen , S. Yanamandra , M.S. Obaidat . Random early detection for congestion avoidance in wired networks: the discretized pursuit learning-automata-like solution. IEEE Trans. Syst. Man Cybern. – Part B , 66 - 76
    20. 20)
      • Li, X.-Y., Wu, Y., Wang, W.: `Stochastic security in wireless mesh networks via saddle routing policy', Proc. WASA, 2007, p. 121–128.
    21. 21)
      • D. Xuyanga , F. Mingyua , L. Xiaojuna , Z. Dayonga , W. Jiahaoa . Multi-path based secure communication in wireless mesh networks. J. Syst. Eng. Electron. , 4 , 818 - 824
    22. 22)
      • G.I. Papadimitriou , A.S. Pomportsis . Self-adaptive TDMA protocols for WDM star networks: a learning-automata-based approach. IEEE Photon. Technol. Lett. , 10 , 1322 - 1325
    23. 23)
      • Agah, A., Das, S.K., Basu, K.: `A game theory based approach for security in wireless sensor networks', Proc. Int. Performance Computing and Communications Conf. (IPCC), April 2004, Phoenix, AZ.
    24. 24)
      • S. Misra , D. Mohanta . Adaptive listen for energy-efficient medium access control in wireless sensor networks. Multimedia Tools Appl. , 1 , 121 - 145
    25. 25)
      • Ping, Y., Tianhao, T., Ning, L., Yue, W., Jianqing, M.: `Security in wireless mesh networks: challenges and solutions', Proc. Sixth Int. Conf. on Information Technology: New Generations, ITNG, 2009, p. 423–428.
    26. 26)
      • Y. Wang , X. Wang , B. Xie , D. Wang , D.P. Agrawal . Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans. Mobile Comput. , 6 , 698 - 711
    27. 27)
      • B.J. Oommen , S. Misra , N. Shimon . (2009) Cybernetics and learning automata, Handbook of automation.
    28. 28)
      • Z. Li , J.J. Garcia-Luna-Aceves , Y. Zhang , J. Zheng , H. Hu . (2008) Non-interactive key establishment in wireless mesh networks, Security in wireless mesh networks.
    29. 29)
      • P. Nicopolitidis , G.I. Papadimitriou , A.S. Pomportsis . Using learning automata for adaptive push-based data broadcasting in asymmetric wireless environments. IEEE Trans. Veh. Technol. , 1652 - 1660
    30. 30)
      • G.I. Papadimitriou , D.G. Maritsas . Learning automata-based receiver conflict avoidance algorithms for WDM broadcast-and-select star networks. IEEE/ACM Trans. Network. , 3 , 407 - 412
    31. 31)
      • Vogt, H., Ringwald, M., Strasser, M.: `Intrusion detection and failure recovery in sensor nodes', Tagungsband INFORMATIK 2005 Workshop Proc. LNCS, September 2005, Heidelberg, Germany.
    32. 32)
      • Gao, M., Tian, J., Li, K., Wu, H.: `Community intrusion detection and pre-warning system based on wireless mesh network', 2008 IEEE Conf. Robotics, Automation and Mechatronics, 2008, p. 1066–1070.
    33. 33)
      • S. Misra , P.V. Krishna , K.I.: Abraham . An adaptive learning scheme for medium access with channel reservation in wireless networks.
    34. 34)
      • A. Avancha , J. Undercoffer , A. Joshi , J. Pinkston . Security for wireless sensor networks, Wireless Sensor Networks.
    35. 35)
      • H. Beigy , M.R. Meybodi . Learning automata based dynamic guard channel algorithms. J. High Speed Netw.
    36. 36)
      • N. Salem , J.-P. Hubaux . Securing wireless mesh networks. IEEE Wirel. Commun. , 2 , 50 - 55
    37. 37)
      • Ferreira, E.W.T., Oliveira, R.De., Carrijo, G.A., Bhargava, B.: `Intrusion detection in wireless mesh networks using a hybrid approach', 29thIEEE Int. Conf. on Distributed Computing Systems Workshops, ICDCSW, 2009, p. 451–454.
    38. 38)
      • Hakami, S., Zaidi, Z., Landfeldt, B., Moors, T.: `Detection and identification of anomalies in wireless mesh networks using principal component analysis (PCA)', Proc. Int. Symp. on Parallel Architectures, Algorithms, and Networks (I-SPAN 2008), 2008, p. 266–271.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0196
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0196
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address