메뉴 건너뛰기




Volumn 19, Issue 1, 2014, Pages 101-120

A distributed and collaborative intrusion detection architecture for wireless mesh networks

Author keywords

Consensus; Intrusion detection; Malicious node; Routing misbehavior; Routing protocol event; Wireless mesh network

Indexed keywords


EID: 84894860127     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-013-0457-8     Document Type: Article
Times cited : (14)

References (35)
  • 1
    • 84867386224 scopus 로고    scopus 로고
    • Future mobile communication networks: Challenges in the design and operation
    • 10.1109/MVT.2011.2179343 10.1109/MVT.2011.2179343
    • Marsch P, Raaf B, Szufarska A, Mogensen P, Hao G, Farber M et al (2012) Future mobile communication networks: challenges in the design and operation. Vehicul Technol Mag, IEEE 7(1):16-23. doi: 10.1109/MVT.2011.2179343
    • (2012) Vehicul Technol Mag, IEEE , vol.7 , Issue.1 , pp. 16-23
    • Marsch, P.1    Raaf, B.2    Szufarska, A.3    Mogensen, P.4    Hao, G.5    Farber, M.6
  • 2
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • 10.1016/j.comnet.2004.12.001 1152.68319
    • Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw ISDN Syst 47(4):445-487. doi: 10.1016/j.comnet.2004.12.001
    • (2005) Comput Netw ISDN Syst , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 4
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • 10.1007/s11276-004-4744-y 10.1007/s11276-004-4744-y
    • Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11(1-2):21-38. doi: 10.1007/s11276-004-4744-y
    • (2005) Wirel Netw , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 5
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • 10.1145/581291.581312 10.1145/581291.581312
    • Zapata MG (2002) Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob Comput Commun Rev 6(3):106-107. doi: 10.1145/581291.581312
    • (2002) SIGMOBILE Mob Comput Commun Rev , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.G.1
  • 6
    • 84875695373 scopus 로고    scopus 로고
    • A key management and secure routing integrated framework for mobile Ad-hoc networks
    • 10.1016/j.adhoc.2012.11.005 10.1016/j.adhoc.2012.11.005
    • Zhao S, Kent R, Aggarwal A (2013) A key management and secure routing integrated framework for mobile Ad-hoc networks. Ad Hoc Netw 11(3):1046-1061. doi: 10.1016/j.adhoc.2012.11.005
    • (2013) Ad Hoc Netw , vol.11 , Issue.3 , pp. 1046-1061
    • Zhao, S.1    Kent, R.2    Aggarwal, A.3
  • 7
    • 70049105507 scopus 로고    scopus 로고
    • SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks
    • 10.1002/sec.60 10.1002/sec.60
    • Li Q, Zhao M, Walker J, Hu Y-C, Perrig A, Trappe W (2009) SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. Sec Commun Netw 2(4):325-340. doi: 10.1002/sec.60
    • (2009) Sec Commun Netw , vol.2 , Issue.4 , pp. 325-340
    • Li, Q.1    Zhao, M.2    Walker, J.3    Hu, Y.-C.4    Perrig, A.5    Trappe, W.6
  • 8
    • 77954089319 scopus 로고    scopus 로고
    • A cluster-based trust-aware routing protocol for mobile ad hoc networks
    • 10.1007/s11276-009-0182-1 10.1007/s11276-009-0182-1
    • Safa H, Artail H, Tabet D (2010) A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel Netw 16(4):969-984. doi: 10.1007/s11276-009-0182-1
    • (2010) Wirel Netw , vol.16 , Issue.4 , pp. 969-984
    • Safa, H.1    Artail, H.2    Tabet, D.3
  • 9
    • 55549128918 scopus 로고    scopus 로고
    • Intrusion detection using a linguistic hedged fuzzy-XCS classifier system
    • 10.1007/s00500-008-0322-z 10.1007/s00500-008-0322-z
    • Marín-Blázquez JG, Pérez GM (2008) Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. Soft Comput 13(3):273-290. doi: 10.1007/s00500-008-0322-z
    • (2008) Soft Comput , vol.13 , Issue.3 , pp. 273-290
    • Marín-Blázquez, J.G.1    Pérez, G.M.2
  • 10
    • 58349116007 scopus 로고    scopus 로고
    • Monitoring smartphones for anomaly detection
    • 10.1007/s11036-008-0113-x 10.1007/s11036-008-0113-x
    • Schmidt A-D, Peters F, Lamour F, Scheel C, Çamtepe SA, Albayrak S (2009) Monitoring smartphones for anomaly detection. Mob Netw Appl 14(1):92-106. doi: 10.1007/s11036-008-0113-x
    • (2009) Mob Netw Appl , vol.14 , Issue.1 , pp. 92-106
    • Schmidt, A.-D.1    Peters, F.2    Lamour, F.3    Scheel, C.4    Çamtepe, S.A.5    Albayrak, S.6
  • 11
    • 84255195597 scopus 로고    scopus 로고
    • Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
    • 10.1002/sec.341 10.1002/sec.341
    • Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N, Gritzalis S (2012) Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Sec Commun Netw 5(1):3-14. doi: 10.1002/sec.341
    • (2012) Sec Commun Netw , vol.5 , Issue.1 , pp. 3-14
    • Damopoulos, D.1    Menesidou, S.A.2    Kambourakis, G.3    Papadaki, M.4    Clarke, N.5    Gritzalis, S.6
  • 12
    • 34548323745 scopus 로고    scopus 로고
    • Attack analysis and detection for Ad Hoc routing protocols
    • E. Jonsson A. Valdes M. Almgren (eds) Lecture notes in computer science 3224 Springer Berlin Heidelberg 10.1007/978-3-540-30143-1-7
    • Huang Y-A, Lee W (2004) Attack analysis and detection for Ad Hoc routing protocols. In: Jonsson E, Valdes A, Almgren M (eds) Recent advances in intrusion detection, vol 3224, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 125-145
    • (2004) Recent Advances in Intrusion Detection , pp. 125-145
    • Huang, Y.-A.1    Lee, W.2
  • 13
    • 33646178576 scopus 로고    scopus 로고
    • An EFSM-based intrusion detection system for ad hoc networks
    • D. Peled Y-K Tsay (eds) Lecture notes in computer science 3707 Springer Berlin Heidelberg 10.1007/11562948-30
    • Orset J-M, Alcalde B, Cavalli A (2005) An EFSM-based intrusion detection system for ad hoc networks. In: Peled D, Tsay Y-K (eds) Automated technology for verification and analysis, vol 3707, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 400-413
    • (2005) Automated Technology for Verification and Analysis , pp. 400-413
    • Orset, J.-M.1    Alcalde, B.2    Cavalli, A.3
  • 15
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • 10.1016/s1389-1286(99)00112-7 10.1016/S1389-1286(99)00112-7
    • Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23-24):2435-2463. doi: 10.1016/s1389-1286(99)00112-7
    • (1999) Comput Netw , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 17
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • 10.1023/a:1024600519144 10.1023/A:1024600519144
    • Zhang Y, Lee W, Huang Y-A (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545-556. doi: 10.1023/a:1024600519144
    • (2003) Wirel Netw , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 18
    • 84892356426 scopus 로고    scopus 로고
    • Security issues in wireless mesh networks
    • E. Hossain K. Leung (eds) Springer US 10.1007/978-0-387-68839-8-12
    • Zhang W, Wang Z, Das SK, Hassan M (2007) Security issues in wireless mesh networks. In: Hossain E, Leung K (eds) Wireless mesh networks. Springer, US, pp 309-330
    • (2007) Wireless Mesh Networks , pp. 309-330
    • Zhang, W.1    Wang, Z.2    Das, S.K.3    Hassan, M.4
  • 20
    • 84894779113 scopus 로고    scopus 로고
    • B.A.T.M.A.N. Advanced Accessed December 2012
    • B.A.T.M.A.N. Advanced. http://www.open-mesh.org. Accessed December 2012
  • 22
    • 84860001693 scopus 로고    scopus 로고
    • Towards benchmarking routing protocols in wireless mesh networks
    • 10.1016/j.adhoc.2011.03.010 10.1016/j.adhoc.2011.03.010
    • Friginal J, de Andrés D, Ruiz J-C, Gil P (2011) Towards benchmarking routing protocols in wireless mesh networks. Ad Hoc Netw 9(8):1374-1388. doi: 10.1016/j.adhoc.2011.03.010
    • (2011) Ad Hoc Netw , vol.9 , Issue.8 , pp. 1374-1388
    • Friginal, J.1    De Andrés, D.2    Ruiz, J.-C.3    Gil, P.4
  • 23
    • 84871379559 scopus 로고    scopus 로고
    • An event-based packet dropping detection scheme for wireless mesh networks
    • Y. Xiang J. Lopez C.C.J. Kuo W. Zhou (eds) Lecture notes in computer science 7672 Springer Berlin Heidelberg 10.1007/978-3-642-35362-8-24
    • Morais A, Cavalli A (2012) An event-based packet dropping detection scheme for wireless mesh networks. In: Xiang Y, Lopez J, Kuo CCJ, Zhou W (eds) Cyberspace safety and security, vol 7672, Lecture notes in computer science. Springer Berlin, Heidelberg, pp 309-323
    • (2012) Cyberspace Safety and Security , pp. 309-323
    • Morais, A.1    Cavalli, A.2
  • 29
    • 84871370165 scopus 로고    scopus 로고
    • Accessed December 2012
    • Virtual Distributed ethernet switch. http://wiki.virtualsquare.org/wiki/ index.php/VDE. Accessed December 2012
    • Virtual Distributed Ethernet Switch
  • 33
    • 33144479525 scopus 로고    scopus 로고
    • SCAN: Self-organized network-layer security in mobile ad hoc networks
    • 10.1109/JSAC.2005.861384 10.1109/JSAC.2005.861384
    • Hao Y, Shu J, Xiaoqiao M, Songwu L (2006) SCAN: self-organized network-layer security in mobile ad hoc networks. Select Areas Commun, IEEE J 24(2):261-273. doi: 10.1109/JSAC.2005.861384
    • (2006) Select Areas Commun, IEEE J , vol.24 , Issue.2 , pp. 261-273
    • Hao, Y.1    Shu, J.2    Xiaoqiao, M.3    Songwu, L.4
  • 34
    • 53749101677 scopus 로고    scopus 로고
    • LIDF: Layered intrusion detection framework for ad-hoc networks
    • 10.1016/j.adhoc.2008.01.001 10.1016/j.adhoc.2008.01.001
    • Komninos N, Douligeris C (2009) LIDF: layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw 7(1):171-182. doi: 10.1016/j.adhoc.2008.01.001
    • (2009) Ad Hoc Netw , vol.7 , Issue.1 , pp. 171-182
    • Komninos, N.1    Douligeris, C.2
  • 35
    • 79151476472 scopus 로고    scopus 로고
    • A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
    • 10.1016/j.comcom.2010.04.040 10.1016/j.comcom.2010.04.040
    • Saxena N, Denko M, Banerji D (2011) A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. Comput Commun 34(4):548-555. doi: 10.1016/j.comcom.2010.04.040
    • (2011) Comput Commun , vol.34 , Issue.4 , pp. 548-555
    • Saxena, N.1    Denko, M.2    Banerji, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.