Abstract
In Wireless Mesh Networks (WMNs), mesh nodes cooperate and forward packets from each other in order to extend their communication range and reach nodes outside their transmission coverage. However, malicious nodes may refuse to cooperate by intentionally dropping packets in order to disrupt the integrity of network services. In this paper, we introduce a distributed and cooperative approach for detection of packet dropping attacks. Intrusion detectors are individually placed at each node to passively monitor the node behavior and exchange routing events and detection results with neighboring nodes. Based on the exchanged events, each node is able to instantly detect malicious behavior on the own node’s communication link or in the neighborhood. A virtualized mesh network environment composed of virtual machines is used to implement the distributed detection approach and demonstrate its effectiveness and reliability for detecting packet dropping attacks in the mesh network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security issues in wireless mesh networks. Wireless Mesh Networks: Architectures and Protocols. Springer, New York (2008)
Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47, 445–487 (2005)
Huang, Y., Lee, W.: A cooperative intrusion detection system for ad-hoc networks. In: 1st Workshop on Security of Ad-Hoc and Sensor Networks (SASN 2003), pp. 135–147 (2003)
Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35(3), 867–880 (2012)
Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 261–273 (2006)
Komninos, N., Douligeris, C.: LIDF: layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks 7(1), 171–182 (2009)
Saxena, N., Denko, M., Banerji, D.: A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Computer Communications 34(4), 548–555 (2011)
Bo-Chao, C., Ryh-Yuh, T.: A Context Adaptive Intrusion Detection System for MANET. Computer Communications 34(3), 310–318 (2011)
Hu, J.: Host-Based Anomaly Intrusion Detection. In: Handbook of Information and Communication Security, pp. 235–255 (2010)
Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7), 1151–1167 (2008)
Neumann, A., Aichele, C., Lindner, M., Wunderlich, S.: Better Approach To Mobile Ad-hoc Networking (B.A.T.M.A.N.). IETF Internet-Draft (expired October 2008) (April 2008)
Morais, A.,Cavalli, A.: Route Manipulation Attack in Wireless Mesh Networks. In: 25th IEEE International Conference on Advanced Information Networking and Applications (AINA 2011), pp. 501–508 (March 2011)
B.A.T.M.A.N. advanced version 2011.2.0, http://www.open-mesh.org/
QEMU - machine emulator and virtualizer, http://wiki.qemu.org/
Netem - Network Emulation, http://www.linuxfoundation.org/networking/netem/
Virtual Distributed Ethernet switch, http://wiki.virtualsquare.org/wiki/index.php/VDE/
Bro - Network Security Monitor, http://bro-ids.org/
Abolhasan, M., Hagelstein, B., Wang, J.C.-P.: Real-world performance of current proactive multi-hop mesh protocols. In: 15th Asia-Pacific Conference on Communications (APCC 2009), pp. 42–45. IEEE Press, Piscataway (2009)
Morais, A., Cavalli, A.: A Distributed Intrusion Detection Scheme for Wireless Ad Hoc Networks. In: 27th Annual ACM Symposium on Applied Computing (March 2012)
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23-24), 2435–2463 (1999)
Morais, A., Cavalli, A.: Detection of Attacks in Wireless Mesh Networks. In: 5th Latin-American Symposium on Dependable Computing (LADC 2011), pp. 45–54 (April 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Morais, A., Cavalli, A. (2012). An Event-Based Packet Dropping Detection Scheme for Wireless Mesh Networks. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)