Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Chapter

Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks

Chapter

Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks

DOI link for Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks

Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks book

Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks

DOI link for Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks

Trust-Based Hybrid IDS for Rushing Attacks in Wireless Mesh Networks book

ByK. Ganesh Reddy, P. Santhi Thilagam
BookRecent Advances in Computer Based Systems, Processes and Applications

Click here to navigate to parent product.

Edition 1st Edition
First Published 2020
Imprint CRC Press
Pages 9
eBook ISBN 9781003043980

ABSTRACT

Securing wireless mesh networks is a more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop, and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features lead to several types of attacks like backhole, grayhole, wormhole and rushing attacks in the network layer. Out of all these attacks, rushing attacks are more difficult to detect due to the difficulty levels to find the exact processing delay at each node in WMNs. Existing security mechanisms to protect against the rushing attacks suffer from high false positives, false negatives and control overhead. In this paper, we proposed a trust-based IDS for rushing attack. The key functionalities of the trust-based IDS are 1) placing the optimal number of trust nodes and 2) Based on the node behavior, dynamic reputation is implemented on node independent and node dependent IDS approaches to identify and isolate the rushing attacks. Our Simulation results show that our proposed IDS secure the network performance such as throughput and packet delivery ratio even in the hostile environment.

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited