2019
DOI: 10.14236/ewic/icscsr19.15
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Intrusion Detection in Ad-Hoc Networks

Abstract: We study efficient and lightweight Intrusion Detection Systems (IDS) for ad-hoc networks via the prism of IPv6-enabled Wireless Sensor Actuator Networks. These networks consist of highly constrained devices able to communicate wirelessly in an ad-hoc fashion, thus following mesh networks. Current state-of-the-art (IDS) have been developed taking into consideration regular computer networks, and as such they do not efficiently addresses the paradigm of ad-hoc networks. In this work we firstly identify a trade-o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…Figures 3 and 4 show that the energy consumption and the communication overhead introduced to the network by the IDS is proportional to the number of nodes operating as IDS agents. This shows that our approach achieved lower communication overhead and energy consumption rate compered to random placement [18] based on connectivity threshold where a constant number of nodes performing the IDS agent. Moreover, figures 2 and 3 show that our approach achieved high detection rate with lower energy consumption which reveals that minimal number of nodes were allowed to run the IDS agent.…”
Section: Simulation Findingsmentioning
confidence: 80%
See 1 more Smart Citation
“…Figures 3 and 4 show that the energy consumption and the communication overhead introduced to the network by the IDS is proportional to the number of nodes operating as IDS agents. This shows that our approach achieved lower communication overhead and energy consumption rate compered to random placement [18] based on connectivity threshold where a constant number of nodes performing the IDS agent. Moreover, figures 2 and 3 show that our approach achieved high detection rate with lower energy consumption which reveals that minimal number of nodes were allowed to run the IDS agent.…”
Section: Simulation Findingsmentioning
confidence: 80%
“…Figure 2 shows that in all network densities the average of detection rate where the subset of the node population operates as an IDS agent selected by our approach that uses cover set (greedy algorithm) remains high, around 80%. Also, the detection rate in random placement of distributed IDS agents based on connectivity threshold [18] remains as high as 85%. However, in very rare cases areas of the network remain unmonitored because of the random placement of IDS agents.…”
Section: Simulation Findingsmentioning
confidence: 99%
“…We consider that the random uniform placement of the sensors inside the network area is abstracted by RGG as we had used in [1]. RGG is formed by n vertices that are placed uniformly at random in the [ 0, 1] 2 square.…”
Section: The Network Modelmentioning
confidence: 99%
“…Various IoT intrusion detection systems (IDS) have been proposed to detect DoS and DDoS attacks [6], with most identifying high incoming traffic volume as characteristic of malicious activity. This has led to several, open-source IDS datasets [7] being created, however these contain huge amounts of post-event network data, with the corollary being that the resulting high storage and processing requirements restrict their usage to only offline analysis.…”
Section: Introductionmentioning
confidence: 99%