An Approach to Detect Intruder in Energy-Aware Routing for Wireless Mesh Networks

  • P. H. Annappa
  • Udaya Kumar K. Shenoy
  • S. P. Shiva Prakash
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 380)


Wireless mesh networks (WMN) possess characteristics such as self-healing, self-configuring and self-discovery. Due to this nature WMN has emerged as the most widely used popular network. Since these devices are operated using battery resources, several works have been carried out for minimizing energy consumption during routing process, thereby increasing network lifetime. WMNs are more vulnerable for attackers due to its wide usage. Many works can be found to detect the intruder during routing without considering energy as a metric. There exist possibilities of intruder to attack the battery resource thereby reducing network efficiency in energy-aware routing. Hence in this work we propose a novel approach to detect an intruder by self-monitoring mechanism of node considering metrics such as packet size, data rate, remaining energy and draining rate of a energy resources of a node. The proposed model consists of three modules, namely self-intrusion detector, monitor and evaluator. It detects and helps in making decisions to participate in the network transmission. The working of the model is analyzed and shows that the proposed model detects intruder effectively, thereby resulting in increase of WMN efficiency.


Energy-aware routing Wireless mesh network Intrusion detection 


  1. 1.
    Bradley, K.: Detecting disruptive routers: a distributed network monitoring approach. IEEE Netw. 12, 50–60 (1998)CrossRefGoogle Scholar
  2. 2.
    Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: 6th Annual ACM International Conference on Mobile Computing and Networking, pp. 275–283. Boston (2000)Google Scholar
  3. 3.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th Annual ACM International Conference on Mobile Computing and Networking, pp. 255–265. Boston (2000)Google Scholar
  4. 4.
    Ramanujan, R., Ahamad, A., Bonney, J., Hagelstrom, R., Thurber, K.: Techniques for intrusion-resistant ad hoc routing algorithms (tiara), pp. 660–664 (2000)Google Scholar
  5. 5.
    Bhargava, S., Agrawal, D.: Security enhancements in aodv protocol for wireless ad hoc networks. In: 2001 IEEE Vehicular Technology Conference, pp. 2143–2147 (2001)Google Scholar
  6. 6.
    Karygiannis, E.A.A., Apostolopoulos, A.: Detecting critical nodes for manet intrusion detection. In: 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), pp. 7–15 (2006)Google Scholar
  7. 7.
    do Carmo, R., Hollick, M.: Ids: mobile and active intrusion detection system for ieee 802.11s wireless mesh networks. In: Proceedings of the 2nd ACM workshop on Hot Topics on Wireless Network Security and Privacy (HotWiSec) pp. 10–15 (2013)Google Scholar
  8. 8.
    Hassanzadeh, A.A., Stoleru, R.: Traffic-and-resource-aware intrusion detection in wireless mesh networks. L Technical Report. Texas AM University pp. 1–20 (2014)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • P. H. Annappa
    • 1
  • Udaya Kumar K. Shenoy
    • 1
  • S. P. Shiva Prakash
    • 2
  1. 1.Nitte Mahalinga Adyanthaya Memorial Institute of TechnologyNitteIndia
  2. 2.Sri Jayachamarajendra College of EngineeringMysoreIndia

Personalised recommendations