Blog
About

234
views
0
recommends
+1 Recommend
1 collections
    6
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Efficient Intrusion Detection in Ad-Hoc Networks

      , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      IDS, IoT, WSN, sinkhole attack

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We study efficient and lightweight Intrusion Detection Systems (IDS) for ad-hoc networks via the prism of IPv6-enabled Wireless Sensor Actuator Networks. These networks consist of highly constrained devices able to communicate wirelessly in an ad-hoc fashion, thus following mesh networks. Current state-of-the-art (IDS) have been developed taking into consideration regular computer networks, and as such they do not efficiently addresses the paradigm of ad-hoc networks. In this work we firstly identify a trade-off between the communication and energy overheads of an IDS (as captured by the number of active IDS agents in the network) and the performance of the system in terms of successfully identifying attacks. In order to fine tune this trade-off, we model such networks as Random Geometric Graphs; a rigorous approach that allows us to capture underlying structural properties of the network. We then introduce a novel IDS architectural approach by having only a subset of the nodes acting as IDS agents. These nodes are able to efficiently detect attacks at the networking layer in a collaborative manner by monitoring locally available network information provided by IoT routing protocols such as RPL. Our detailed experimental evaluation demonstrates significant performance gains in terms of communication overhead and energy dissipation while maintaining high detection rates. We also show that the performance of our IDS in ad-hoc networks does not rely on the size of the network but on fundamental underling network properties, such as the network topology and the average degree of the nodes.

          Related collections

          Most cited references 10

          • Record: found
          • Abstract: not found
          • Article: not found

          DDoS in the IoT: Mirai and Other Botnets

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            SVELTE: Real-time intrusion detection in the Internet of Things

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              6TiSCH: deterministic IP-enabled industrial internet (of things)

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2019
                September 2019
                : 117-125
                Affiliations
                Bournemouth University

                Faculty of Science & Technology

                Dorset,Poole,UK
                Article
                10.14236/ewic/icscsr19.15
                © Mohammed Al Qurashi et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                6th International Symposium for ICS & SCADA Cyber Security Research 2019
                ICS-CSR
                6
                Athens, Greece
                10th-12th September 2019
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article