2006
DOI: 10.1109/jsac.2005.861387
|View full text |Cite
|
Sign up to set email alerts
|

A framework for misuse detection in ad hoc Networks-part I

Abstract: We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the intrusion detection modules for misuse-based detection strategy. Our goal is to maximize the detection rate subject to limited availability of communication and computational resources. We mathematically formulate this problem, and show that computing the optimal solution is NP-hard. Thereafter, we propose two approximation algorithms that approximate the optimal solution within a constant factor, and prove that th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(41 citation statements)
references
References 21 publications
0
41
0
Order By: Relevance
“…Our novel approach for monitoring node selection is to consider monitoring "wireless links" and not monitoring "nodes" as existing solutions propose [9,10]. Our approach helps detecting attacks that affect functionality of communication link, e.g., Black hole attack.…”
Section: Intrusion Detection System and Attacker Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Our novel approach for monitoring node selection is to consider monitoring "wireless links" and not monitoring "nodes" as existing solutions propose [9,10]. Our approach helps detecting attacks that affect functionality of communication link, e.g., Black hole attack.…”
Section: Intrusion Detection System and Attacker Modelmentioning
confidence: 99%
“…The monitoring node selection as an optimization problem has received some attention [9,10,12], where the first two papers optimize the channel assignment in monitoring nodes equipped with multi-channel radios, while the latter only addresse the coverage problem of distributed monitoring selection algorithms. While the authors use existing mesh routers for monitoring purposes, another set of related work (e.g., [9,13]) considers deploying additional monitoring nodes.…”
Section: State Of Artmentioning
confidence: 99%
See 1 more Smart Citation
“…• Transmission security is based on digital signature method [12] in which each node uses private key to sign the blacklist.…”
Section: Blacklisting Of the Nodesmentioning
confidence: 99%
“…Monitoring node solutions [8][9][10] select a subset of nodes (called monitoring nodes), assign each selected node the same set of IDS functions for monitoring a distinct part of network (i.e., either communication links [10] or WMN nodes [9]). These solutions, however, suffer from high false negative rates because some IDS functions cannot be activated on monitoring nodes due to limited resources (e.g., memory and processing power).…”
Section: Introductionmentioning
confidence: 99%