liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Modular Anomaly Detection for Smartphone Ad Hoc Communication
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, The Institute of Technology.
2012 (English)In: Information Security Technology for Applications: 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers / [ed] Peeter Laud, Springer Berlin/Heidelberg, 2012, Vol. 7161, 65-81 p.Chapter in book (Refereed)
Abstract [en]

The capabilities of the modern smartphones make them the obvious platform for novel mobile applications. The open architectures, however, also create new vulnerabilities. Measures for prevention, detection, and reaction need to be explored with the peculiarities that resource-constrained devices impose. Smartphones, in addition to cellular broadband network capabilities, include WiFi interfaces that can even be deployed to set up a mobile ad hoc network (MANET). While intrusion detection in MANETs is typically evaluated with network simulators, we argue that it is important to implement and test the solutions in real devices to evaluate their resource footprint. This paper presents a modular implementation of an anomaly detection and mitigation mechanism on top of a dissemination protocol for intermittently-connected MANETs. The overhead of the security solution is evaluated in a small testbed based on three Android-based handsets and a laptop. The study shows the feasibility of the statistics-based anomaly detection regime, having low CPU usage, little added latency, and acceptable memory footprint.

Place, publisher, year, edition, pages
Springer Berlin/Heidelberg, 2012. Vol. 7161, 65-81 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 (print), 1611-3349 (online) ; 7161
Keyword [en]
intrusion detection; resource footprint; ad hoc networking
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:liu:diva-87581DOI: 10.1007/978-3-642-29615-4_6ISI: 000310342000006ISBN: 978-3-642-29614-7 (print)ISBN: e-978-3-642-29615-4 OAI: oai:DiVA.org:liu-87581DiVA: diva2:589547
Available from: 2013-01-18 Created: 2013-01-18 Last updated: 2013-02-01

Open Access in DiVA

No full text

Other links

Publisher's full text

Authority records BETA

Cucurull, JordiNadjm-Tehrani, SiminRaciti, Massimiliano

Search in DiVA

By author/editor
Cucurull, JordiNadjm-Tehrani, SiminRaciti, Massimiliano
By organisation
Software and SystemsThe Institute of Technology
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 97 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf