Abstract

In this paper, we propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken for RTS-CTS handshake between sender and receiver (TT). Since it is not possible for an attacker to assume the RSS exactly for a sender by a receiver, it is an useful measure for intrusion detection. We propose that we can develop a dynamic profile for the communicating nodes based on their RSS values through monitoring the RSS values periodically for a specific Mobile Station (MS) or a Base Station (BS) from a server. Monitoring observed TT values at the server provides a reliable passive detection mechanism for session hijacking attacks since it is an unspoofable parameter related to its measuring entity. If the weight value is greater than a threshold value, then the corresponding node is considered as an attacker. By suitably adjusting the threshold value and the weight constants, we can reduce the false positive rate, significantly. By simulation results, we show that our proposed technique attains low misdetection ratio and false positive rate while increasing the packet delivery ratio.

Highlights

  • Wireless network can be defined as a network of wireless Local Area Networks (LAN) that are linked together to set up a Metropolitan Area Network(MAN), generally situated in one geographical area

  • In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken for RTS-CTS Handshake (TT)

  • We propose that we can develop a dynamic profile for the communicating nodes based on their RSS values through monitoring the RSS values periodically for a specific Mobile Station (MS) or a Base Station (BS) from a server

Read more

Summary

Introduction

Wireless network can be defined as a network of wireless Local Area Networks (LAN) that are linked together to set up a Metropolitan Area Network(MAN), generally situated in one geographical area. Every single wireless network comprises of several nodes which are connected together. A node can be illustrated as a set of numerous PCs or other devices linked together by directly making use of the IP network and within direct radio range. A node comprises of a minimum of one router and one or more clients. The clients require fewer configurations and communicate only to the router. By using radio links or any another ways, the nodes can be linked together. Network, it requires a complex mesh of connections between the nodes. The network’s clients connect to the nodes from their home or office and complete the entire network. The nodes which do not have any clients become each group’s network environment [1]

Intrusion Detection
Classification of Intrusion Detection Techniques
Statistical Anomaly Detection Techniques
Rule-Based Intrusion Detection Techniques
Various Intrusion Detection Techniques for Wireless Networks
Related Work
Cross-layer Based Intrusion Detection Technique
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call