Font Size: a A A

Intrusion Detection Model Based Wmns Research

Posted on:2009-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:H J LiuFull Text:PDF
GTID:2208360245961271Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Mesh Networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of fast, easy and inexpensive network deployment, WMNs have more advantages over other wireless networks. However, there are many issues to apply WMNs. The most prominent issue among them is: security, and intrusion detection technology is a very important component of it.Because of the characteristic of wireless networks, the traditional wireless networks Distributed Intrusion Detection models can not use detection information of other network nodes effectively. To address this issue, this dissertation proposes two intrusion detection models, one for malicious mesh routers, and the other for malicious mesh client.Based on most of mesh routers in WMNs with minimal mobility, the concepts of exchange-adjacent-node and exchange-adjacent-table are proposed in the malicious mesh router intrusion detection model, and each mesh router maintains an exchange-adjacent-table for every mesh router it monitor , those tables record the information of its exchange-adjacent-nodes. This model adopts the method of exchanging intrusion information between exchange-adjacent-nodes to achieve effective use of the existing detection information of other nodes, and fill in the deficiency of single node is isolated with each other in the traditional wireless network distributed intrusion detection model. The way of detection information exchanging can be divided into direct exchange and indirect routing exchange.As mesh routers provides routing services for mesh clients, in the malicious mesh client intrusion detection model the ownership-token is proposed, when a mesh router has the ownership-token of a mesh client, this client belongs to this mesh router, and every mesh router is maintaining an ownership-table, which records the information of the owner of some mesh clients. In this model, detect information is delivered to the owner of the mesh client which relates to this detect information, so the owner can use the existing detection information in WMNs effectively. The delivery process can be divided into direct delivery and recursive delivery, and mesh router can update the ownership-table according to confirmation message during the delivery process.Finally, this dissertation presents the simulations for the malicious mesh router and client intrusion detection model. In the simulations for the malicious mesh router intrusion detection, we analyzed the impact of the malicious mesh router mobile speed and the number of reliable mesh router on the detection rate. In the malicious Mesh Router simulation experiments, we analyzed the impact of the malicious mesh client attack frequency, the malicious mesh router mobile speed and the number of reliable mesh router on the detection rate. The above simulations show that the intrusion detection models proposed in this dissertation are clearly superior to the traditional distributed intrusion detection model of wireless networks in which single node is isolated with each other.
Keywords/Search Tags:Wireless Mesh Networks, Intrusion Detection, Detection Information Exchange
PDF Full Text Request
Related items