Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules….

Reference URL 1: Visit Now

Reference URL 2: Visit Now

Author: Radosavac, Svetlana

Source: University of Maryland


1 Introduction
1.1 Our contributions
1.2 Thesis Organization
2 Literature overview
2.1 MAC layer misbehavior detection
2.2 Cross-layer misbehavior detection
3 IEEE 802.11 MAC DCF
3.1 Overview of the protocol
3.2 IEEE 802.11 MAC Misbehavior
3.3 Impact of interference on misbehavior detection schemes
3.3.1 Interference due to concurrent transmissions
3.3.2 Interference due to simultaneous channel access
4 Min-max robust misbehavior detection
4.1 Introduction
4.2 Problem motivation and sequential detection
4.3 Min-max robust detection: definition of uncertainty class
4.3.1 Problem description and assumptions
4.3.2 Adversary model
4.4 Min-max robust detection: derivation of the worst-case attack
4.5 Experimental evaluation of optimal attack strategies
4.5.1 Impact of multiple competing nodes on the performance of the op-timal attacker
4.5.2 Performance comparison of MAC layer misbehavior detection schemes
5 Collaborative attacks
5.1 Definition of the Uncertainty Class
5.2 Derivation of the worst-case attack for n=2 adversaries
5.3 Derivation of the worst-case attack for n > 2 adversaries
5.4 Experimental Results
6 Impact of interference on the performance of optimal detection schemes
6.1 Overview
6.2 Problem setup
6.2.1 Derivation of the worst-case attack in the presence of interference
6.3 FSM for SINR variation
6.3.1 System model
6.3.2 Performance analysis
7 Cross-entropy minimization and its applications in intrusion detection
7.1 Analysis of single and multi-stage attacks
7.2 Derivation of the worst-case attack using the principle of minimum crossentropy
7.3 Optimal Attack Scenario in the MAC Layer Using the Cross-entropy Method
8 Cross-layer impact of optimal attacks
8.1 Impact of MAC Layer Misbehavior on the Network Layer: Time to Buffer Overflow
8.2 Numerical Results
8.2.1 Cross-layer effects of the optimal MAC layer attacks
8.2.2 Implementation of an optimal MAC layer-based IDS

Leave a Comment