By Topic

Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Adaobi, O. ; Sch. of Comput. & Math. Sci., Univ. of Greenwich, London, UK ; Igbesoko, E. ; Ghassemian, M.

Security in Wireless Self-organised Networks (WSoN) could be looked at from various view points with respect to different communication layers through which their functionalities are attained. Multihop communication between mobile devices may require specially designed routing algorithms for self-organised networks; those routing protocols can become primary targets for attacks. In this article we run a simulation study of an attack causing an 86% decrease in packet delivery ratio and an increase in packet drops by the same proportion for a selected scenario. We simulated a wireless sensor network with the presence of phenomenon, to investigate and extended it to generate denial of service attacks. We have used the phenomenon contribution to generate a realistic traffic pattern for accurate evaluation of protocols, and compared it to the traditional method of using only Constant Bit Rate (CBR) traffic, usually employed by most researchers. We then adapted an Intrusion Detection System (IDS) into our simulated sensor network, and achieved detection rate of greater than 90% with a very low false positive rate of less than 1%. Each node was configured to independently monitor, detect and report intrusions, providing us with more accurate results and avoiding the additional delays and existence of a central point of failure that a centralised IDS would introduce. We also investigated the impact of a Black-hole attack on MANETS and we observed that under the on-demand routing protocol, the closer a malicious node is to the source of traffic, the greater the extent of damage inflicted on the networks. This study on security attacks and intrusion detection systems has led us to illustrate some of the particular security issues in WSoN.

Published in:

New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on

Date of Conference:

7-10 May 2012