Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

被引:7
|
作者
Karri, Ganesh Reddy [1 ]
Thilagam, P. Santhi [1 ]
机构
[1] NITK, Dept Comp Sci & Engn, Surathkal, India
关键词
long-distance communications; reputation; intrusion detection; goodput; packet collisions; COUNTERMEASURE; NODES;
D O I
10.1002/sec.955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless mesh networks provide long-distance wireless network connectivity over heterogeneous devices for greater scalability and availability. However, protecting legitimate long-distance wireless links from wormhole attacks is an important yet challenging security issue in wireless mesh networks. In this paper, we propose a reputation-based cross-layer intrusion detection system to effectively detect various wormhole attacks. The proposed system analyses the behaviours of the routing paths in wireless mesh networks to correctly isolate the malicious wormhole paths from legitimate long-distance wireless links. It uses reputation and cross-layer parameters for comprehensive ability to isolate the wormhole attacks in routing paths. This isolation ensures full utilisation of legitimate long-distance wireless links in wireless mesh networks, which is not possible with the existing wormhole attack detection approaches. Experimental results show that the proposed system increases the detection rate, decreases the false alarm rate, and secures legitimate long-distance wireless links in wireless mesh networks. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2442 / 2462
页数:21
相关论文
共 50 条
  • [21] A distributed cross-layer intrusion detection system for ad hoc networks
    Liu, Yu
    Li, Yang
    Man, Hong
    ANNALS OF TELECOMMUNICATIONS, 2006, 61 (3-4) : 357 - 378
  • [22] Sinkhole Attack Detection by Enhanced Reputation-Based Intrusion Detection System
    Mohammed, Fadwa Abdul-Bari Ahmed
    Mekky, Nagham E.
    Soliman, Hassan
    Hikal, Noha A.
    IEEE ACCESS, 2024, 12 : 86985 - 86996
  • [23] Detecting Denial of Service attacks using cross layer based intrusion detection system in wireless ad hoc networks
    Bose, S.
    Kannan, A.
    ICSCN 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING COMMUNICATIONS AND NETWORKING, 2008, : 182 - 188
  • [24] RTT based wormhole detection for wireless mesh networks
    Roy A.K.
    Khan A.K.
    International Journal of Information Technology, 2020, 12 (2) : 539 - 546
  • [25] Wormhole attacks detection and prevention based on 2-hop neighbor in Wireless Mesh Networks
    Wen, Huaiyu
    Luo, Guangchun
    Journal of Information and Computational Science, 2013, 10 (14): : 4461 - 4476
  • [26] Cross-layer Scheduling Algorithms for IEEE 802.16 Based Wireless Mesh Networks
    Jian Zhang
    Honglin Hu
    Lu Rong
    Hsiao-Hwa Chen
    Wireless Personal Communications, 2009, 51 : 615 - 634
  • [27] Congestion Control Based on Cross-layer Game Optimization in Wireless Mesh Networks
    Ma, Xianhu
    Xu, Li
    Min, Geyong
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 41 - 46
  • [28] Cross-layer Scheduling Algorithms for IEEE 802.16 Based Wireless Mesh Networks
    Zhang, Jian
    Hu, Honglin
    Rong, Lu
    Chen, Hsiao-Hwa
    WIRELESS PERSONAL COMMUNICATIONS, 2009, 51 (03) : 615 - 634
  • [29] Cross-layer optimization for OFDMA-based wireless mesh backhaul networks
    Karakayali, Kemal
    Kang, Joseph H.
    Kodialam, Murali
    Balachandran, Krishna
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 276 - 281
  • [30] A Cross-layer Design based on Link Quality for Cognitive Wireless Mesh Networks
    Gu Jinyuan
    Zhang Guoan
    Bao Zhihua
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,