Skip to main navigation Skip to search Skip to main content

PRIDE: Practical intrusion detection in resource constrained wireless mesh networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing power and memory). Cooperative IDS solutions, targeting resource constrained wireless networks impose high communication overhead and detection latency. To address these challenges, we propose PRIDE (PRactical Intrusion DEtection in resource constrained wireless mesh networks), a non-cooperative real-time intrusion detection scheme that optimally distributes IDS functions to nodes along traffic paths, such that detection rate is maximized, while resource consumption is below a given threshold. We formulate the optimal IDS function distribution as an integer linear program and propose algorithms for solving it accurately and fast (i.e., practical). We evaluate the performance of our proposed solution in a real-world, department-wide, mesh network.

Original languageEnglish
Title of host publicationInformation and Communications Security - 15th International Conference, ICICS 2013, Proceedings
Pages213-228
Number of pages16
DOIs
StatePublished - 2013
Event15th International Conference on Information and Communications Security, ICICS 2013 - Beijing, China
Duration: Nov 20 2013Nov 22 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8233 LNCS

Conference

Conference15th International Conference on Information and Communications Security, ICICS 2013
Country/TerritoryChina
CityBeijing
Period11/20/1311/22/13

Keywords

  • Integer linear programming
  • Intrusion detection
  • Real-world implementation
  • Resource constraints
  • Wireless mesh network

Fingerprint

Dive into the research topics of 'PRIDE: Practical intrusion detection in resource constrained wireless mesh networks'. Together they form a unique fingerprint.

Cite this