IIUM Repository

A pay-and-stay model for tackling intruders in hybrid wireless mesh networks

Pathan, Al-Sakib Khan and Abduallah, Wafaa Mustafa and Khanam, Shapla and Saleem, Habibullah Yusuf (2012) A pay-and-stay model for tackling intruders in hybrid wireless mesh networks. Simulation-Transactions of the Society for Modeling and Simulation International, 89 (5). pp. 616-634. ISSN 0037-5497

[img] PDF (A pay-and-stay model for tackling intruders in hybrid wireless mesh networks) - Accepted Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: http://sim.sagepub.com/

Abstract

Intrusion handling in Wireless Mesh Networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes (IDS or IPS) are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find it necessary to specifically focus on this field. Another critical reason may be the difficulty in developing an effective scheme for WMN. In fact, the structural differences among various wireless ad hoc networking technologies make it imperative to devise the mechanisms in subtle but critically different ways. For WMN, there is a proper network backbone that is called mesh backbone (which is not present in many other wireless network counterparts), which supports the fringe part or the mesh clients. Hence, it is often possible to install the intrusion handling mechanisms or agents in the stable part and allowing some flexibility in the client or fringe parts. Nonetheless, instead of thinking in this pattern, we take a different approach of tackling intrusion by allowing an intruder to stay in the network as long as it proves to be worthy of staying in the network by supporting the network’s regular activities. The idea is that; not always direct purging out of rogue entities is useful but rather exploiting the intruder’s resources, the network could get benefited. We call our approach an intrusion tackling mechanism and term it as Pay-and-Stay model. Alongside presenting the details and analysis of our model, in this paper, we also present the basics of various forms of intrusion handling in such types of networks. By our evaluation results, we found that the model could be very effective in handling intruders and defending the network against a broad range of security attacks.

Item Type: Article (Journal)
Additional Information: SCIE Journal. As of October 31, 2012, Impact Factor: 0.793
Uncontrolled Keywords: Game Theory, Intrusion, Selective Forwarding, Tackling, Wireless Mesh Network
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr. Al-Sakib Khan Pathan
Date Deposited: 17 Dec 2012 15:30
Last Modified: 30 Jul 2013 11:21
URI: http://irep.iium.edu.my/id/eprint/26316

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year