Loading...
Please wait, while we are loading the content...
Similar Documents
Practical intrusion detection in resource constrained wireless mesh networks.
| Content Provider | CiteSeerX |
|---|---|
| Author | Hassanzadeh, Amin Xu, Zhaoyan Stoleru, Radu Gu, Guofei |
| Abstract | Abstract. As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing and memory). Cooperative IDS solutions, targeting resource constrained wireless networks impose high communication overhead and detection latency. To address these challenges, we propose a non-cooperative real-time intrusion detection scheme that optimally distributes IDS functions to nodes along traffic paths, such that intrusion detection rate is maximized, while resource consumption is below a given threshold. We formulate the optimal IDS function distribution as an integer linear program and propose algorithms for solving it accurately and fast (i.e., practical). We evaluate the performance of our proposed solution in a real-world, department-wide, mesh network. 1 |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Resource Constrained Wireless Mesh Network Practical Intrusion Detection Intrusion Detection Optimal Id Function Distribution Full Id Function Traditional Solution Full Id Responsibility Id Function Intrusion Detection Rate Detection Latency Recent Result Mesh Network Security Challenge Wireless Mesh Network Grows Integer Linear Program Non-cooperative Real-time Intrusion Detection Scheme Cooperative Id Solution Mesh Router Cannot Resource Consumption Traffic Path Wireless Network Paramount Importance Limited Resource High Communication Overhead |
| Content Type | Text |
| Resource Type | Article |