2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems 2008
DOI: 10.1109/mahss.2008.4660099
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection systems for community wireless mesh networks

Abstract: Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Some existing solutions address specific attacks (e.g., Man-in-the-Middle and Wormhole Attacks [16], Grayhole attack [17], message fabrication attack [13], and scheduling in WMN [18]). Other solutions are general IDS solutions for mesh networks, which consider memory, processing [11,14,19], and energy [10] constraints for performing off-the-shelf IDS tools on WMN devices. The later group of IDS solutions aim at addressing the challenges associated with monitoring mechanisms for intrusion detection in WMN, as opposed to the former group which addresses specific attacks in such networks.…”
Section: State Of the Artmentioning
confidence: 99%
“…Some existing solutions address specific attacks (e.g., Man-in-the-Middle and Wormhole Attacks [16], Grayhole attack [17], message fabrication attack [13], and scheduling in WMN [18]). Other solutions are general IDS solutions for mesh networks, which consider memory, processing [11,14,19], and energy [10] constraints for performing off-the-shelf IDS tools on WMN devices. The later group of IDS solutions aim at addressing the challenges associated with monitoring mechanisms for intrusion detection in WMN, as opposed to the former group which addresses specific attacks in such networks.…”
Section: State Of the Artmentioning
confidence: 99%
“…A redundant node can be placed on an important area to make sure reliability and to avoid destruction. Another community‐based IDS presents a set of socio‐technical challenges associated with developing an IDS for a community WMN. However, this architecture does not explicitly address the challenges with system administrator.…”
Section: Review Of the Ids Solutions For Wireless Networkmentioning
confidence: 99%
“…The idea of Makaroff et al 18 is to note down various basic information about intrusion detection in WMNs and to propose an IDS architecture. This work, however, is very elementary and the authors also note that they put forward an initial design of a modular architecture for intrusion detection, highlighting how it addresses their identified challenges.…”
Section: Related Work and Motivationmentioning
confidence: 99%