Abstract
Wireless PAN Mesh Network (WMN) is currently going to be standardized and enhanced to take full advantages of the flexible and heterogeneous networks. Although the standard (802.15.5) is under-construction, WMNs are expected to become popular as they have the ability to connect all kinds of current networks. So far, there is no applied architecture which is efficient enough to completely solve routing and security problems in WMN. To assist IEEE P805.15 in routing and security aspects, in this paper, we propose an adaptive algorithm for detecting bogus nodes when they attempt to intrude into the network by attacking routing protocol. In addition, a procedure to find the most optimal path between two nodes is presented along with adaptive pre-conditions for WMNs. We also show that our algorithm is robust according to the mobility of the nodes and it is easy to implement in currently proposed architectures. It can work with many kinds of wireless networks as well as can reduce computational costs.
An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
IEEE 802.15-15-05-0247-00-0005, Mesh PAN Alliance (MPA), IEEE 802.15.5 Working Group for Wireless Personal Area Networks
IEEE 802.15.5-05-0260-00-0005, IEEE 802.15.5 WPAN Mesh Network, IEEE 802.15.5 Working Group for Wireless Personal Area Networks
Guan, Y., Ghorbani, A.B.: A clustering method for intrusion detection. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, Canada, pp. 1083–1086 (2003)
Basagni, S.: Distributed Clustering in Ad Hoc Networks. In: Proceedings of the 1999 Intl. Symp. on Parallel Architectures, Algorithms and Networks (I-SPAN 1999), Freemantle, Australia (1999)
Sterne, D.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceeding of the Third IEEE International Workshop on Information Assurance (IWIA 2005), IEEE, Los Alamitos (2005)
Huang, Y.-a., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), George W. Johnson Center at George Mason University, USA, October 31 (2003)
Karpijoki, V.: Security in Ad Hoc Networks, http://citeseer.nj.nec.com/karpijoki01security.html
Brutch, P., Ko, C.: Challenges in Intrusion Detection for Ad Hoc Network. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, January 28 (2003)
Wrona, K.: Distributed Security: Ad Hoc Networks & Beyond. In: PAMPAS Workshop, London, September 16/17 (2002)
Theoleyre, F., Valois, F.: A Virtual Structure for Hybrid Networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2004), Atlanta, USA (March 2004)
Krishna, P., Vaidya, N.H., Chatterjee, M., Pradhan, D.K.: A cluster-based approach for routing in dynamic networks. ACM SIGCOMM Computer Communication Review (1997)
Huang, M.-Y., Jasper, R.J., Wicks, T.M.: A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 2465–2475 (1999)
Ryan, J., Lin, M.-J., Milikkulainen, R.: Intrusion Detection with Neural Networks. In: Advances in Neural Information Processing Systems. Proceedings of NIPS 1997, Denver, CO, vol. 10, MIT Press, Cambridge (1998)
Ilgun, K., Kemmerer, R.A., Porras, P.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering, 181–199 (1995)
Porras, P.A., Neumann, P.G.: Emerald, Event monitoring enabling responses to anomalous live disturbances. In: Proc. of 20th NIST-NCSC Nat’l. Info. Systems Security Conf., pp. 353–365 (1997)
Zheng, J., Lee, M.J., Anshel, M.: Towards Secure Low Rate Wireless Personal Area Networks. IEEE Transactions on mobile computing
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)
Perkins, C.E., Belding-Royer, E.M., Das, S.: Ad Hoc On Demand Distance Vector (AODV) Routing. IETF RFC 3561
Perkins, C.E., Royer, E.M.: The ad hoc on-demand distance-vector protocol. In: Perkins, C.E. (ed.) Ad Hoc Networking, Addison-Wesley, Reading (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hieu, C.T., Dai, T.T., Hong, C.S., Lee, JJ. (2006). Adaptive Algorithms to Enhance Routing and Security for Wireless PAN Mesh Networks. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_82
Download citation
DOI: https://doi.org/10.1007/11915034_82
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48269-7
Online ISBN: 978-3-540-48272-7
eBook Packages: Computer ScienceComputer Science (R0)