Traffic-and-resource-aware intrusion detection in wireless mesh networks

As the interest in Wireless Mesh Networks (WMN), as an infrastructureless wireless network, grows, security issues, especially intrusion detection, become of paramount importance. The diversity in hardware along with a variety of WMN applications, have resulted in WMN with different network characteristics (e.g., resource levels, system and security models, etc.). Consequently, different intrusion detection mechanisms have been proposed by the research community. Recently, the community has proposed several monitoring techniques for intrusion detection where each considers different assumptions and presents a different problem formulation for optimal monitoring. This article proposes a taxonomy that categorizes existing solutions in this research area and identifies the similarities and differences in their optimal monitoring problem formulations. We then concentrate on two classes of monitoring techniques for intrusion detection in WMN: Traffic Agnostic and Resourceful and Traffic Aware and Resourceful and present centralized and distributed algorithms for solving optimal monitoring problem in these networks. Through extensive simulations and a real implementation, we demonstrate the effects of different network characteristics on the problem formulation and consequently the performance (e.g., intrusion detection rate and resource consumption) of proposed solutions for optimal monitoring in WMN.

[1]  Songwu Lu,et al.  SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Terence D. Todd,et al.  Energy Provisioning in Solar-Powered Wireless Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.

[3]  Christos Douligeris,et al.  LIDF: Layered intrusion detection framework for ad-hoc networks , 2009, Ad Hoc Networks.

[4]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[5]  Kemal Akkaya,et al.  A taxonomy and evaluation for developing 802.11‐based wireless mesh network testbeds , 2012, Int. J. Commun. Syst..

[6]  Jianer Chen,et al.  Efficient flooding in Wireless Sensor Networks secured with neighborhood keys , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[7]  Felix C. Freiling,et al.  Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.

[8]  Radu Stoleru,et al.  Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[9]  Paul Gardner-Stephen,et al.  The Village Telco project: a reliable and practical wireless mesh telephony infrastructure , 2011, EURASIP J. Wirel. Commun. Netw..

[10]  Wei Zhou,et al.  DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response , 2010, IEEE Communications Magazine.

[11]  Guofei Gu,et al.  PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks , 2013, ICICS.

[12]  John A. Clark,et al.  Power-Aware Intrusion Detection in Mobile Ad Hoc Networks , 2009, ADHOCNETS.

[13]  Mahesh K. Marina,et al.  Tegola tiered mesh network testbed in rural Scotland , 2008, WiNS-DR '08.

[14]  Sarma B. K. Vrudhula,et al.  Energy management for battery-powered embedded systems , 2003, TECS.

[15]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[16]  Bernhard Walke,et al.  IEEE 802.11s: The WLAN Mesh Standard , 2010, IEEE Wireless Communications.

[17]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[18]  Ana R. Cavalli,et al.  A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks , 2013, Mobile Networks and Applications.

[19]  Harsha Chenji,et al.  A wireless system for reducing response time in Urban Search & Rescue , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).

[20]  Saurabh Bagchi,et al.  Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.

[21]  Pang-Ning Tan,et al.  Distributed Detection of Selfish Routing in Wireless Mesh Networks , 2007 .

[22]  David Hutchison,et al.  OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.

[23]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[24]  Jan Bauer,et al.  Poster: Deploying a mesh-based command and control sensing system in a disaster area maneuver , 2011, SenSys.

[25]  Radu Stoleru,et al.  DistressNet: A disaster response system providing constant availability cloud-like services , 2013, Ad Hoc Networks.

[26]  Guofei Gu,et al.  Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks , 2012 .

[27]  Dongwoo Kim,et al.  Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks , 2006 .

[28]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.

[29]  Fan Zhang,et al.  Environmental Monitoring System with Wireless Mesh Network Based on Embedded System , 2008, 2008 Fifth IEEE International Symposium on Embedded Computing.

[30]  Saurabh Bagchi,et al.  Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[31]  Gertjan van Stam,et al.  A Rural Implementation of a 52 Node Mixed Wireless Mesh Network in Macha, Zambia , 2009, AFRICOM.

[32]  Basem Shihada,et al.  Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks , 2011, ADHOC-NOW.

[34]  Mieso K. Denko,et al.  A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks , 2011, Comput. Commun..

[35]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[36]  Matthias Hollick,et al.  DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks , 2013, HotWiSec '13.

[37]  Devu Manikantan Shila,et al.  Load-aware Traffic Engineering for Mesh Networks , 2007, 2007 16th International Conference on Computer Communications and Networks.

[38]  David Hutchison,et al.  Intrusion detection systems for community wireless mesh networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[39]  Yk Kwok Sensor Networks and Multi-hop Communications,” The Second IEEE International Workshop on Wireless Mesh and Ad Hoc Networks (WiMAN 2008), in conjunction with the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China , 2008 .

[40]  Paramvir Bahl,et al.  Feasibility study of mesh networks for all-wireless offices , 2006, MobiSys '06.

[41]  Chi Ma,et al.  Battery-Aware Scheduling in Wireless Mesh Networks , 2008, Mob. Networks Appl..

[42]  Steven Furnell,et al.  Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.

[43]  David Johnson Evaluation of a single radio rural mesh network in South Africa , 2007, 2007 International Conference on Information and Communication Technologies and Development.

[44]  Kuang-Ching Wang,et al.  Wireless infrastructure for remote environmental monitoring: Deployment and evaluation , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[45]  William H. Robinson,et al.  A distributed intrusion detection system for resource-constrained devices in ad-hoc networks , 2010, Ad Hoc Networks.

[46]  Y. Li,et al.  A Wireless Sensor , AdHoc and Delay Tolerant Network System for Disaster Response , 2011 .

[47]  Qijun Gu,et al.  Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[48]  Radu Stoleru,et al.  On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..

[49]  Saswati Sarkar,et al.  A framework for misuse detection in ad hoc Networks-part I , 2006, IEEE Journal on Selected Areas in Communications.

[50]  Terence D. Todd,et al.  Resource Allocation and Outage Control for Solar-Powered WLAN Mesh Networks , 2007, IEEE Transactions on Mobile Computing.

[51]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[52]  Guohong Cao,et al.  Distributed Monitoring and Aggregation in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[53]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[54]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[55]  Prasant Mohapatra,et al.  QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[56]  Johnathan Ishmael,et al.  Deploying Rural Community Wireless Mesh Networks , 2008, IEEE Internet Computing.

[57]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[58]  Jingsha He,et al.  A Distributed Intrusion Detection Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[59]  Stefan Bouckaert,et al.  A Wireless Mesh Monitoring and Planning Tool for Emergency Services , 2007, 2007 Workshop on End-to-End Monitoring Techniques and Services.

[60]  Udo W. Pooch,et al.  Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.

[61]  Christos V. Verikoukis,et al.  Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks , 2011, EURASIP J. Wirel. Commun. Netw..

[62]  Claudiu Danilov,et al.  The SMesh wireless mesh network , 2008, TOCS.