About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers

Research Article

Signalprint-Based Intrusion Detection in Wireless Networks

Download(Requires a free EAI acccount)
454 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-11526-4_7,
        author={Rob Mitchell and Ing-Ray Chen and Mohamed Eltoweissy},
        title={Signalprint-Based Intrusion Detection in Wireless Networks},
        proceedings={Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers},
        proceedings_a={SEWCN},
        year={2012},
        month={5},
        keywords={intrusion detection wireless networks Signalprints identity-based attacks performance analysis},
        doi={10.1007/978-3-642-11526-4_7}
    }
    
  • Rob Mitchell
    Ing-Ray Chen
    Mohamed Eltoweissy
    Year: 2012
    Signalprint-Based Intrusion Detection in Wireless Networks
    SEWCN
    Springer
    DOI: 10.1007/978-3-642-11526-4_7
Rob Mitchell1,*, Ing-Ray Chen1,*, Mohamed Eltoweissy1,*
  • 1: Virginia Tech
*Contact email: rrmitche@vt.edu, irchen@vt.edu, toweissy@vt.edu

Abstract

Wireless networks are a critical part of global communication for which intrusion detection techniques should be applied to secure network access, or the cost associated with successful attacks will overshadow the benefits that wireless networks offer. In this paper we investigate a new scheme called Nodeprints to extend the existing centralized Signalprints design for authentication to a distributed voting-based design for intrusion detection. We analyze the effect of voting-based intrusion detection designs, the probability of an individual node voting incorrectly, the ratio of mobile nodes to base stations, and the rate at which nodes are compromised, on the system performance measured by the probability that the intrusion detection system yields a false result. We develop a performance model for evaluating our Nodeprints design and identify conditions under which Nodeprints outperforms the existing Signalprints design.

Keywords
intrusion detection wireless networks Signalprints identity-based attacks performance analysis
Published
2012-05-25
http://dx.doi.org/10.1007/978-3-642-11526-4_7
Copyright © 2009–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL