2011
DOI: 10.1007/978-3-642-22450-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Monitoring for Intrusion Detection in Battery-Powered Wireless Mesh Networks

Abstract: Abstract. Wireless Mesh Networks (WMN) are easy-to-deploy, low cost solutions for providing networking and internet services in environments with no network infrastructure, e.g., disaster areas and battlefields. Since electric power is not readily available in such environments batterypowered mesh routers, operating in an energy efficient manner, are required. To the best of our knowledge, the impact of energy efficient solutions, e.g., involving duty-cycling, on WMN intrusion detection systems, which require … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…Some existing solutions address specific attacks (e.g., Man-in-the-Middle and Wormhole Attacks [16], Grayhole attack [17], message fabrication attack [13], and scheduling in WMN [18]). Other solutions are general IDS solutions for mesh networks, which consider memory, processing [11,14,19], and energy [10] constraints for performing off-the-shelf IDS tools on WMN devices. The later group of IDS solutions aim at addressing the challenges associated with monitoring mechanisms for intrusion detection in WMN, as opposed to the former group which addresses specific attacks in such networks.…”
Section: State Of the Artmentioning
confidence: 99%
See 4 more Smart Citations
“…Some existing solutions address specific attacks (e.g., Man-in-the-Middle and Wormhole Attacks [16], Grayhole attack [17], message fabrication attack [13], and scheduling in WMN [18]). Other solutions are general IDS solutions for mesh networks, which consider memory, processing [11,14,19], and energy [10] constraints for performing off-the-shelf IDS tools on WMN devices. The later group of IDS solutions aim at addressing the challenges associated with monitoring mechanisms for intrusion detection in WMN, as opposed to the former group which addresses specific attacks in such networks.…”
Section: State Of the Artmentioning
confidence: 99%
“…This approach is inefficient primarily because of redundant monitoring on multi-hop traffic that causes unnecessary resource consumption (e.g., resources that can be allocated to other networking services). The aforementioned inefficiency triggered major research on optimal monitoring for intrusion detection systems [8][9][10][23][24][25]. In optimal monitoring solutions, a minimum subset of nodes is selected to perform IDS functions and monitor the entire network traffic.…”
Section: State Of the Artmentioning
confidence: 99%
See 3 more Smart Citations