Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks

Intrusion monitoring is an indispensable security measure for multi-channel wireless mesh networks. This paper studies how to use mesh routers to monitor a network while supporting regular traffic. This paper shows that the traffic aware monitoring (TRAM) problem is an NP-hard problem, which is challenging in coordinating monitoring and traffic forwarding to provide maximal monitoring coverage. This paper proposes three heuristic strategies for seeking optimal monitoring channels and develops a TRAM protocol for accommodating monitoring and transmission simultaneously in mesh networks. The evaluation shows that the proposed TRAM scheme can effectively utilize mesh routers' idle time for monitoring with only minor impact to regular traffic.

[1]  Randeep Bhatia,et al.  Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks , 2006, IEEE J. Sel. Areas Commun..

[2]  Himanshu Gupta,et al.  Multichannel MAC Protocols for Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[3]  Lakshminarayanan Subramanian,et al.  Practical, distributed channel assignment and routing in dual-radio mesh networks , 2009, SIGCOMM '09.

[4]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[5]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Salil S. Kanhere,et al.  Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[7]  B SrivastavaMani,et al.  Reputation-based framework for high integrity sensor networks , 2008 .

[8]  Robert Tappan Morris,et al.  Architecture and evaluation of an unplanned 802.11b mesh network , 2005, MobiCom '05.

[9]  Saurabh Bagchi,et al.  Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.

[10]  Qijun Gu,et al.  A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++ , 2010, SpringSim.

[11]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[12]  Pin-Han Ho,et al.  SLAB: A secure localized authentication and billing scheme for wireless mesh networks , 2008, IEEE Transactions on Wireless Communications.

[13]  Salil S. Kanhere,et al.  NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.

[14]  Songwu Lu,et al.  SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Xiuzhen Cheng,et al.  Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks , 2007, MobiCom '07.

[16]  Salil S. Kanhere,et al.  Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006 .

[17]  Sencun Zhu,et al.  Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  Nitin H. Vaidya,et al.  Routing and link-layer protocols for multi-channel multi-interface ad hoc wireless networks , 2006, MOCO.

[20]  Tzi-cker Chiueh,et al.  Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Qijun Gu,et al.  Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[22]  Yongdae Kim,et al.  Remote Software-Based Attestation for Wireless Sensors , 2005, ESAS.

[23]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[24]  Antonio Capone,et al.  Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks , 2009, Comput. Networks.

[25]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[26]  Saswati Sarkar,et al.  A framework for misuse detection in ad hoc Networks-part I , 2006, IEEE Journal on Selected Areas in Communications.

[27]  Bharat K. Bhargava,et al.  Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[28]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[29]  Xiaojun Lin,et al.  A Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad-hoc Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.