Next Article in Journal
Investigation of a Miniaturized E-Band Cosine-Vane Folded Waveguide Traveling-Wave Tube for Wireless Communication
Next Article in Special Issue
Detection of DGA-Generated Domain Names with TF-IDF
Previous Article in Journal
Investigation of Mean-Time-to-Failure Measurements from AlGaN/GaN High-Electron-Mobility Transistors Using Eyring Model
Previous Article in Special Issue
An Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless Networks

by
Jaime Zuniga-Mejia
*,
Rafaela Villalpando-Hernandez
,
Cesar Vargas-Rosales
and
Mahdi Zareei
Tecnologico de Monterrey, Escuela de Ingenieria y Ciencias, Monterrey 64849, Mexico
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(24), 3053; https://doi.org/10.3390/electronics10243053
Submission received: 11 October 2021 / Revised: 1 December 2021 / Accepted: 1 December 2021 / Published: 7 December 2021
(This article belongs to the Special Issue Design of Intelligent Intrusion Detection Systems)

Abstract

:
Detection accuracy of current machine-learning approaches to intrusion detection depends heavily on feature engineering and dimensionality-reduction techniques (e.g., variational autoencoder) applied to large datasets. For many use cases, a tradeoff between detection performance and resource requirements must be considered. In this paper, we propose Loci-Constellation-based Intrusion Detection System (LC-IDS), a general framework for network intrusion detection (detection of already known and previously unknown routing attacks) for reconfigurable wireless networks (e.g., vehicular ad hoc networks, unmanned aerial vehicle networks). We introduce the concept of ‘attack-constellation’, which allows us to represent all the relevant information for intrusion detection (misuse detection and anomaly detection) on a latent 2-dimensional space that arises naturally by considering the temporal structure of the input data. The attack/anomaly-detection performance of LC-IDS is analyzed through simulations in a wide range of network conditions. We show that for all the analyzed network scenarios, we can detect known attacks, with a good detection accuracy, and anomalies with low false positive rates. We show the flexibility and scalability of LC-IDS that allow us to consider a dynamic number of neighboring nodes and routing attacks in the ‘attack-constellation’ in a distributed fashion and with low computational requirements.

1. Introduction

With the advent of new technologies on the horizon, such as the fifth generation of mobile communication (5G), the fourth industrial revolution, Intelligent Transportation Systems (ITS), smart cities or the Internet of Things (IoT), the number of users and range of applications for wireless communications are continuously increasing. The number of IoT connections worldwide is expected to grow from 8.6 to 22.3 billion from 2018 to 2024 [1]. As the number and range of use case scenarios for mobile communications grows, so the technical challenges associated with the network operation do. Some future applications will require massive amounts of bandwidth (e.g., virtual/augmented reality) [2]; while some other critical infrastructure applications may require Ultra-Reliable-Low-Latency-Communication (URLLC) [3], (e.g., remote surgery, vehicular communications). In order to meet the user and network demands for such a wide range of applications, wireless networks must be adaptable and reconfigurable. Reconfigurable wireless networks (RWN) [4], represent a new paradigm that allows networks to be reconfigurable at each layer of the communication stack. At the physical layer, cognitive radio techniques can be used to share spectrum between primary and secondary users, and techniques such as adaptive coding and modulation (ACM) can be used to adapt the transceivers to wireless channel phenomena (e.g., path loss, fading, interference). At the medium access control (MAC) layer, adaptive transmission rates can reduce the number of frame collisions, while transmission and sleep scheduling are necessary for energy constrained devices. At the transport layer, congestion control techniques are usually implemented. At the network layer, decentralized topologies are considered, and the data routing must adapt to the data traffic conditions and to the dynamic network topology caused by different network phenomena, such as channel fading, or node mobility.
Because the routing process has great impact on network performance parameters (e.g., end-to-end-delay, throughput or packet delivery rate (PDR)) it is an essential mechanism to meet the user and network application demands. Different alternatives for RWN routing protocols have been proposed [5,6]. Most of these routing protocols were developed assuming a cooperative network environment, free of malicious entities. However, the open and highly dynamic nature, as well as the lack of a central organism in charge of security, make RWN vulnerable to routing attacks. A malicious node could launch a routing attack to control data traffic, to degrade network performance (e.g., sinkhole, worm hole), or to deplete network resources, such as energy or bandwidth, (e.g., flooding, rushing attack) [7,8]. For the case of critical infrastructure cyber-physical systems, network attacks may imply potential economic and human losses, thus, it is important to protect RWN from these threats [9,10].
Different secure routing protocols that rely on the encryption of the routing information have been proposed to protect the routing process in RWN [11,12]. It is worth mentioning that secure routing techniques are a necessary, but not sufficient approach for secure RWN. This is because secure routing cannot prevent all types of routing attacks, as could be the case for a selective forwarding attack, in which an attacker node discards a fraction of the packets to be forwarded, to degrade the network’s throughput. Complementary techniques must be considered. Intrusion detection systems (IDS) are a set of techniques whose purpose is to identify hostile or anomalous behavior. Several IDS have been proposed to protect RWN from routing attacks [13,14]. Depending on the intrusion detection paradigm, IDS can be labeled in one of three main classes, anomaly detection, misuse detection, and hybrid approaches. Misuse-detection approaches have a good detection performance for known attacks, but are not capable of identifying unknown attacks. Anomaly-detection techniques are good to identify previously unseen threats, but cannot easily identify known attacks. Hybrid approaches are ensembles of techniques with an overall improved attack-detection performance, but with increased complexity and resource demands. It is important to mention that most proposed misuse-based and hybrid approaches in the literature, focus on a specific attack or a small set of classes of routing attacks, while anomaly-detection techniques tend to have a high false alarm rate. A more general approach that combines the complementary properties of misuse and anomaly-detection techniques is necessary to reduce the complexity of hybrid methods. Reduced complexity is essential for the implementation of IDS in low power devices (e.g., sensor node powered by energy harvesting technologies).
In this paper, we focus on the complementary detection capabilities of different IDS paradigms. Our objective is to develop a generalized mathematical framework to create an IDS capable of misuse and anomaly detection on a two-dimensional feature space, with a single distributed and lightweight intrusion detection technique. We introduce Loci-Constellation-based Intrusion Detection System (LC-IDS), which is a general lightweight and distributed technique for routing intrusion detection in RWN. The proposed approach is inspired by the root locus -based misuse-detection approach presented in recent literature [15], in which authors demonstrated the low computational workload and the attack-detection capabilities of their approach. This low computational workload is achieved by the intrinsic dimensionality-reduction capabilities of the technique. In the root locus misuse detection, each node adaptively models their neighboring nodes behavior as piecewise linear systems at a given instant. With this dynamic model, it is possible to detect routing attacks from a set of known classes of attacks, by considering the location of system poles on the Z -plane. Then, the Z -plane acts as an orthogonal two-dimensional feature space, which implies a reduced computational workload for the attack-detection process. This is true because malicious nodes have a dynamic behavior that is inherently different from a regular node behavior. The authors demonstrated that their approach can be used to design individual distributed and lightweight attack detectors for a wide variety of routing attacks and network scenarios [16]. In this paper, we develop further the ideas proposed in [15], and build a framework for the attack-constellation concept. However, instead of considering the frequency domain representation of individual piecewise linear systems to design individual attack detectors, we obtain the general state-space equations that model each neighboring node. Then, we use these general state-space (SS) equations to obtain a single model that contains several attack detectors, and that has anomaly-detection capabilities. This approach allows us to extend the misuse-detection capabilities of the work presented in [15] to a more general and lightweight misuse and anomaly-detection technique. The frequency domain representation of this generalized model contains all the relevant information to represent all the known attacks on a two-dimensional feature space, the Z -plane. Because of the fact that the Z -plane representation of each attack considered in the general state-space model has its own root locus trajectories, we introduce the concept of ‘attack-constellation’, which is a visualization tool to represent all the relevant information on a two-dimensional space (similar to constellation representations of modulated signals, such as quadrature amplitude modulation (QAM)). In addition, we use this two-dimensional feature space to perform anomaly detection. This allows us to identify unknown threats, for which we can design attack detectors to include them in the general state-space model and the corresponding ‘attack-constellation’. The main contributions of this paper are the following:
  • We propose a general mathematical framework based on the theory of dynamical systems, to identify routing attacks and anomalous behaviors from the local perspective of an individual node in RWN. With this mathematical framework, we present LC-IDS, which is a general and distributed intrusion detection technique capable of misuse and anomaly detection.
  • We introduce the concept of ‘attack-constellation’, which allows us to represent all the relevant information for intrusion detection on a latent 2-dimensional space. By this approach, a single node can adapt to the changing network conditions by considering a dynamic number of neighboring nodes and routing attacks to be analyzed.
  • We show through simulations (including a wide range of network scenarios, including different node densities, different locations of the attack nodes, several attack severity values for the considered routing attacks and node mobility) that the proposed lightweight and distributed technique can detect already known routing attacks and previously unseen anomalies with good performance.
The rest of this paper is organized as follows, Section 2 presents background information in intrusion detection for RWN, a concise revision of relevant literature and a summary of open challenges in the state of the art, and an introduction to the root locus-based misuse detection. In Section 3, we present the definitions and notation of basic concepts used to explain our approach to intrusion detection. In Section 4, we introduce the proposed general mathematical framework for anomaly and misuse detection for routing in RWN, and we discuss the implementation of the proposed technique. Section 5 covers the experimental setup for a wide variety of network conditions simulated, we report the misuse and anomaly-detection performance rates for each case of study. Finally, in Section 6, contains the conclusions of this work.

2. Intrusion Detection Fundamentals and State of the Art

In this section, we present an introduction to the main issues of network intrusion detection for the routing problem in RWN, including a concise literature review. Additionally, we discuss the strengths and areas of opportunity of the main IDS paradigms and the most relevant open research challenges, which we try to overcome with our approach, to be explained in Section 4. Later we introduce the root locus-based misuse detection, which is the basis for this work.

2.1. Network Intrusion Detection Systems for RWN

The network intrusion detection problem consists of the identification of potentially hostile or anomalous network activities, [13,14]. In order to identify malicious activities, any IDS must perform three basic functions, data collection, intrusion detection and intrusion response. During the data collection phase, the IDS must collect and prepare relevant network metrics (e.g., application logs, information from data packets and data flows) that the intrusion detection engine will use to identify of malicious activities. The data preparation may imply techniques such as data normalization and dimensionality reduction, which are used to improve the detection performance of the intrusion detection engine. The intrusion detection engine is used to decide if there is any malicious or hostile network activity. The intrusion detection problem is, in essence, a classification problem. The intrusion detection engine must classify a given node as malicious or not malicious given the information previously collected and pre-processed by the data collection module. There are different intrusion detection methodologies for routing in RWN, the most relevant are distributed approaches, statistics-based, and machine-learning approaches. In distributed approaches, as the name implies, network nodes cooperate with each other to distribute the computational overhead of the intrusion detection task. Two popular approaches for distributing the computation of intrusion detection among the network nodes are biologically inspired techniques and trust-based techniques. Biologically inspired IDS try to create a complex global response to an attack from simple local interactions of network nodes, as in swarm intelligence-based techniques [17,18,19], and artificial immune systems-based approaches [20,21]. Trust-based techniques tend to have good attack-detection performance at the expense of increasing the bandwidth due to the required information exchange (e.g., trust metrics) among neighboring nodes [22,23,24]. Statistics-based techniques rely on statistic metrics and either static or dynamic thresholds to detect routing attacks, they tend to have accurate attack-detection performance for static and low mobility network scenarios, but for highly dynamic scenarios the obtaining of decision threshold becomes a hard challenge [25,26,27,28,29]. Machine learning approaches are capable of learning from the given data. For that reason, they are a good candidate for IDS in RWN because those techniques can continuously learn and adapt to the dynamic network environment and the changing network topology. Their main drawback is the high computational workload that these techniques imply to be trained and executed [30,31,32,33,34]. The last function of an IDS is the intrusion response, and it refers to the actions taken by the IDS after the identification of an intruder. Those actions may imply adding the potentially malicious node to a blacklist or triggering alerts to the network administrators.
The design of an IDS is a complex task, and for the particular case of IDS for routing in RWN there are some additional difficulties due to the inherent decentralized, self-organizing and dynamic nature of the network. The IDS for RWN must be implemented in nodes with severe restrictions in terms of energy, processing power, memory and bandwidth (e.g., sensor network placed at a remote location and whose nodes are powered by small batteries and energy harvesting devices). In addition, the network topology is highly dynamic due to channel fading, node mobility or sleeping schedules. This dynamic topology causes regular changes in traffic profiles, which make it difficult for modeling normal traffic behavior or the signature behavior of an attack. In the highly dynamic and stochastic nature of RWN, network performance could be affected by possible attacker nodes, and be degraded by ‘natural networking’ causes (e.g., node mobility, node sleep scheduling, packet loss due to traffic congestion or wireless channel impairments such as interference, multipath or fading). The lack of a central entity makes it hard to use a centralized data collection, which discards IDS with centralized architectures. The ideal IDS should be a lightweight attack-detection mechanism, capable of adapting to the rapid changes in the network conditions, robust, scalable, the time to detect any threat should be minimum to limit the damage produced by the attacker, and it would provide the necessary tools to recover from an incident.

2.2. Intrusion Detection Engine Paradigms

As stated previously, the intrusion detection process can be thought of as a classification problem, and there are three main paradigms for intrusion detection, anomaly detection, misuse detection, and hybrid approaches. Each paradigm has its own strengths, which we explain in this subsection and which we take advantage of, for the proposed LC-IDS, explained in detail in Section 4.

2.2.1. Anomaly Detection

Anomaly detection is, in essence, an outlier detection approach, because it uses the concept of normal network state and deviations from it. This normal network state is obtained from historical records of each user’s behavior. Any deviation from the obtained normal state is considered an outlier or an anomalous situation. Anomaly-detection techniques do not require prior information of the attack to be detected, this implies that there is no need for a database of known attacks. Therefore, this methodology is powerful to detect previously unseen attacks or anomalous activities, which is a useful property, given that cyber-attacks are continuously evolving. However, due to the dynamic nature of the network traffic and network topology of RWN, the normal network state could be very dynamic in time, and it could lead to a significant amount of false alarms.

2.2.2. Misuse Detection

Misuse detection or signature-based detection systems usually rely on a database that stores the typical signature of all the known threats. This attack signature consists of the typical impact of the considered attack on a given set of network parameters. In order to detect a malicious node, the misuse detection system compares the behavior of each user to each attack signature in the database. Misuse detection is, in essence, a pattern-matching approach that tends to have good performance in detecting known attacks, but has difficulties in detecting unknown network anomalies. Another drawback of misuse-detection approaches is that they require a constant update of the database of known attacks, which can be a bandwidth and energy demanding process.

2.2.3. Hybrid Approaches

Hybrid approaches, as the name implies, are typically ensembles of anomaly detection and misuse-detection systems. Hybrid approaches tend to have an improved attack-detection performance compared to individual approaches, this is because of the complementary detection capabilities of misuse and anomaly-detection techniques. The main drawback of hybrid approaches is the extra complexity and computational workload that those ensembles of techniques imply on the IDS. This extra complexity and computational cost may limit their range of applications to powerful host nodes. In order to implement any IDS on low power devices, it must be lightweight because of the energy and computational power constraints that some nodes could have (e.g., sensor nodes).

2.3. Open Challenges in the Literature

From the literature review, we can identify some of the most relevant open challenges related to IDS for routing in RWN, some of which we overcome with our proposed approach, introduced in Section 4. Those current issues can be summarized as follows:
  • Network resources such as the amount of memory required, the processing workload, the used bandwidth and the time-to-detection are not commonly considered to compare the performance of different IDS. The performance evaluation for IDS is typically measured in terms of attack-detection accuracy metrics, such as the number of false negatives, the number of false positives, and detection accuracy. However, given the highly dynamic and resource constrained nature of RWN, memory, processing and bandwidth requirements are also important to the implementation of any IDS, which remain an open challenge for most of the use cases of IDS in RWN (e.g., sensor networks).
  • IDS usually sacrifice attack-detection performance to reduce the resource consumption related to its implementation. Scalable, robust and lightweight IDS must be designed.
  • Collaborative and hierarchical-based IDS effectively distribute the computational workload of the IDS, but they consume one of the most valuable network resources, bandwidth. This limits the scalability of some of those approaches. Hierarchical schemes help to alleviate the bandwidth consumption issue.
  • The right feature space selection is crucial to achieve good attack-detection performance. However, it is difficult to find accurate normal traffic patterns or attack signatures in the complex and stochastic network environment of RWN. Machine-Learning (ML) techniques are good candidates to solve this issue, but most ML-based IDS are computationally intensive approaches which require the use of dimensionality-reduction techniques.
  • A general approach for IDS is necessary to reduce the complexity of hybrid methods. The majority of proposed IDS for RWN in the literature focus on a specific attack or a small set of classes of routing attacks.
  • Most of the classical machine-learning techniques do not take into consideration the temporal changes in the input data to extract useful patterns for classification.
The root locus misuse detection presented in [15], takes advantage of dynamic models that are well suited to study the time-varying nature of RWN. By this approach, it addresses some of the described open research challenges, such as the dynamism, scalability, robustness and the low demands for computational resources. The main drawback of root locus misuse detection, is that individual attack detectors must be designed for all the known attacks, and it does not have anomaly-detection capabilities to identify previously unseen threats. In the next subsection, we summarize the main ideas presented in [15], which we take as a basis to develop our general approach for intrusion detection, described in Section 4. In our approach in Section 4, we obtain the general state-space equations that model each neighboring node from the local perspective of an individual network node, instead of considering the frequency domain representation of individual piecewise linear systems to design individual attack detectors as described in [15]. Then, we use these general state-space equations to obtain a single model that contains several attack detectors and that has anomaly-detection capabilities.

2.4. Root Locus Based Misuse Detection

The authors in [15], proposed a mathematical framework for misuse detection for routing in RWN. This framework is based on the theory of dynamical systems, in which they consider each node as a dynamical system that models the node’s dynamic behavior and its individual contribution to the network performance. The system output signals are local network performance metrics (e.g., point-to-point delay, link throughput), and the input signals are different network metrics of the channel state and the internal state of the node (e.g., signal-to-noise-ratio (SNR), number of collided frames, packets in queue). Given the dynamic nature of the network, the dynamical systems that model each node are nonlinear, but those dynamical systems can be linearized at any given instant. The authors propose a simple premise, there are inherent differences in the dynamic behavior of attacker nodes and regular nodes; and those differences will be reflected in the frequency domain representation of the models for those nodes. They propose that each node adaptively models each neighboring node’s dynamic behavior as piecewise discrete-time linear systems at a given instant. Then, they use the Z -plane representation of those models as a two-dimensional feature space for identifying neighboring malicious nodes. This reduced feature space arises naturally, independently of the number of input and output signals considered, and it does not imply any loss of information; thus, the computational workload for the attack-detection process is reduced because there is no need for additional dimensionality-reduction techniques (e.g., PCA). With this mathematical framework, the authors proposed two different IDS, the first is based on a black box system identification technique, the second IDS is based on root locus principle. For the black box approach, the authors use a black box system identification technique to model the input–output relationship of the local performance metrics and the metrics obtained from the channel and the node state. For the root locus-based attack-detection technique, the authors take advantage of the root locus principle used in control theory, they propose some definitions of the input signals in terms of delayed metrics of the channel and node state and the relevant local performance metrics, the output signals are defined in terms of the current local performance metrics. The authors demonstrate that with those input and output signal definitions, the system poles move on predefined trajectories on the Z -plane. They also proved that with their root locus-based approach, they could minimize the probability of classification error, by adjusting the model parameters. The authors show the intrinsic dimensionality reduction, low computational cost and good attack-detection capabilities of both techniques through a case study. They concluded that the root locus technique can be used to design individual attack detectors for an arbitrary number of routing attacks, at a lower computational cost, compared to the black box technique. For that reason, in this work, we generalize the root locus-based attack-detection approach presented in [15], to introduce a general, scalable and robust intrusion detection technique capable of misuse and anomaly detection for routing in RWN.

3. Basic Definitions and Notation

Let us define relevant concepts. Please note that we have modified the notation proposed in [15] because it neither allows us to represent multiple attack detectors in a single state-space model, nor it includes the anomaly-detection concept.

3.1. Reconfigurable Wireless Networks

RWN are dynamic entities composed of nodes connected among themselves with wireless communication links, and continuously sharing flows of information through those links in a point-to-point fashion. Those communication links can be lost or established at any moment due to different network phenomena, such as node mobility, channel fading or sleep scheduling; therefore, network topology is highly dynamic in nature.
We can describe the RWN topology at a given instant τ as a dynamic directed graph as,
G τ = ( V τ , L τ ) ,
where
  • V τ = { v i : i = 1 , 2 , , S τ } is the set of nodes. There is a total of S τ nodes at instant τ ,
  • L τ = { l i j = ( v i , v j ) : v i , v j V τ } is the set of ordered pairs representing communication links at the same instant τ . The subindices order in each link definition represents the direction of that link. If for any given order pair, ( v i , v j ) , the link l i j L τ , then ∄ l i j , the link does not exists at that instant τ , for any given reason (e.g., nodes are out of communication range, sleeping scheduling issues, channel fading).
Figure 1a, shows an example of a network topology G τ 1 , described at a given instant τ 1 ; the set of nodes is V τ 1 = { v 1 , v 2 , v 3 , v 4 } and the set of links is L τ 1 = { l 12 , l 21 , l 13 , l 31 , l 34 , l 43 } . Please note that links l 24 , l 42 do not exist and therefore they are not in the set of links, l 24 , l 42 L τ 1 .

3.2. Neighboring Nodes

Given that we are defining the mathematical framework for a distributed technique, we focus on a particular node v i and its vicinity, to explain our approach, without loss of generality. The set of neighboring nodes to a particular node v i V τ , at a given instant τ , is defined as,
N i V τ = { v j : l j i L τ } .
In Figure 1a, the set of neighboring nodes of v 3 is N 3 = { v 1 , v 4 } at instant τ 1 .

3.3. Routing Attacks

We assume that any malicious node v A V τ , has access to the RWN, and that it could launch a routing attack at a given instant. The set composed of a total of M known routing attacks is defined as,
Ω A = { ω g : g = 1 , 2 , , M } .
Each ω g , has associated an attack severity metric that is bounded between a minimum and a maximum attack severity value. This attack severity metric is defined as,
ψ g [ ψ g m i n , ψ g m a x ] .
As previously stated, routing attacks have an impact on network performance. The attack severity metric is defined in such a way that a greater value of attack severity corresponds to a greater impact on network performance degradation.
Figure 1b, shows an RWN in which the attacker node v A launches the g-th routing attack, a selective forwarding attack for this particular example. In this selective forwarding attack, the malicious node v A , drops some of the data packets to be relayed with a probability p D = 0.1 . The attack severity of ω g can be defined as the probability of a packet being dropped by the attacker node, ψ g = p D . By this attack severity definition, any increment in attack severity will correspond to a greater degradation of network performance (e.g., throughput). And being defined as a probability, the attack severity is bounded by minimum and maximum values, ψ g [ ψ g m i n = 0 , ψ g m a x = 1 ] . In this particular example, if the attacker node v A , decides to change the attack severity, to the minimum possible value ψ g m i n = 0 , this implies that not one packet will be dropped by the malicious node; and if the decision is change to the maximum possible attack severity value ψ g m a x = 1 , this represents that all the data packets are discarded by v A .
Please note that given the dynamic nature of RWN and the appearance of previously unknown vulnerabilities in routing, the total number of known attacks M, could be varying over time. For that reason, the use of anomaly-detection-based approaches is essential to secure RWN.

3.4. Local Information to Detect Routing Attacks

LC-IDS uses local information to infer a global network state and to identify a potential neighboring attacker v A N i , launching a specific routing attack or having an anomalous behavior. We classify the local information as local performance metrics and complementary information:
  • Local performance metrics. The global network performance can be thought of as a composition of individual performance contributions of each node v i V τ . Given that routing attacks cause network performance degradation, some local performance metrics could be used to identify hostile neighboring nodes. The concept of local performance metric refers to the performance metrics that each node v i V τ , can measure from its local perspective (e.g., point-to-point delay, link throughput, link PDR). The total number of L local performance metrics that a node can measure are defined in the set,
    P = { π a : a = 1 , 2 , , L } .
    Each local performance metric π a , is defined in such a way that any performance degradation corresponds to an increase in the metric. Additionally, each g-th routing attack ω g Ω A can degrade at least one local performance metric π a P and each π a P can be affected by one or more attacks. Please note that the subindex in each π a P is used to identify each metric in the set, but it does not indicate any particular order.
    The subset P g , composed of a total of λ p L , of local performance metrics that the misuse detection part of LC-IDS uses to detect the g-th routing attack is defined as,
    P g = { π a P : ω g can be detected } , | P g | = λ p .
  • Complementary information. Given that routing attacks are one, but not the only possible cause of network performance degradation, we need to consider complementary information that allows us to discriminate routing attacks. The set of complementary network metrics that a node v i can measure to discard routing attacks is defined as,
    X = X A X N ,
    where
    -
    X A = { χ A b : b = 1 , 2 , , A } , is the set of local network metrics that are related to routing attacks and performance degradation (e.g., a large number of routing control messages may indicate a possible RREQ flooding attack), there are a total of A elements in the set, | X A | = A ,
    -
    X N = { χ N c : c = 1 , 2 , , N } is the set of local network metrics related to ‘natural’ performance degradation (e.g., a low link throughput may be caused by channel congestion, measured with the number of colliding frames per time unit, or by the number of packets discarded in queue per time unit). There is a total of N elements in the set, | X N | = N .
    The subindices b and c in χ A b X A and χ N c X N , help to identify each metric in their respective set, those subindices do not indicate any order in the metrics.
    Because a lightweight intrusion detection technique is essential for its implementation on low power devices, we do not need to consider every network metric χ A b X A , χ N c X N , to detect the g-th routing attack; but we can consider subsets of relevant metrics to identify each routing attack ω g . Those subsets X A g X A , and X N g X N , are defined as, X A g = { χ A b X A : ω g can be detected } , whose cardinality is | X A g | = λ a g , and, X N g = { χ N c X A : ω g can be detected } , whose cardinality is | X N g | = λ n g .
Please note that the reduced cardinality of the subsets of complementary network metrics, contribute to a lower computational workload of LC-IDS; | X A g | = λ a g < | X A | = A ; | X N g | = λ n g < | X N | = N .

3.5. LC-IDS Architecture

The authors in [15], take a divide and conquer strategy, in which each node v i obtains an adaptive Linear Shift-Invariant (LSI) system model I D S i j , ω g , for each neighboring node v j N i and for each routing attack ω g Ω A , every time period k T , k = 0 , 1 , 2 , . An LSI system is a mathematical model that describes the dynamical relation between the discrete input and output signals of the system of interest (e.g., network node). By modeling the dynamic behavior of network nodes at a given instant, we can identify malicious nodes because of their inherently different dynamic behavior from the rest of the network nodes. Figure 2a, shows this approach, implemented in a node v i with at least one neighboring node, N i = { v 1 , } . The IDS implemented in v i can be decomposed in I D S i 1 , I D S i 2 , ... Each I D S i j , can be further decomposed in attack detectors for each routing attack in Ω A = { ω 1 , , ω M } . This approach allows them to design individual robust and lightweight misuse detectors for an arbitrary number of neighboring nodes and classes of routing attacks; however, each I D S i j is independent of each other, which implies that anomaly detection cannot be performed directly, without considering additional techniques. In Figure 2b, we show the architecture of the proposed LC-IDS, in which each node adaptively models the dynamic behavior of its neighboring nodes; only one LC-IDS is modeled for each neighboring node v j N i . Each L C I D S i j , can perform anomaly detection and misuse detection of all the known routing attacks ω g Ω A . In Section 4.2 we describe the dynamic behavior of the LSI that models each L C I D S i j , in Section 4.4 and Appendix A we explain the theoretical framework that allows us to perform misuse and anomaly detection in the same lightweight IDS. This theoretical framework for general intrusion detection is the main contribution of this work.
Table 1 summarizes and defines the notation of the basic concepts presented in this section.

4. Loci-Constellation-Based Intrusion Detection System (LC-IDS)

In this section, we define the general mathematical framework for intrusion detection engine of our proposed technique, which uses the local data collection approach described in Section 3.4. We discuss the implementation of online attack and anomaly detection engine of LC-IDS. Online attack detection is performed in real time, unlike forensics approaches, in which network data are analyzed after the network attack. Please note that local data collection allows the method to operate without scarifying the network resources such as bandwidth, synchronization and node power battery, which result very convenient in dense sensor networks. Our objective is to develop a generalized mathematical framework to create an IDS capable of misuse and anomaly detection on a two-dimensional feature space, with a single distributed and lightweight intrusion detection technique. We will take advantage of the state-space representation of the dynamic behavior of neighboring nodes to detect known routing attacks and previously unseen network anomalies.

4.1. Parametric Autoregressive Model

We begin the definition of the mathematical framework for the proposed intrusion detection technique by the misuse detection part of LC-IDS. Our objective is to obtain an adaptive LSI system that models the dynamic behavior of each neighboring node v j N i , to later use the Z -plane representation of that model as a two-dimensional feature space to detect each known attack ω g Ω A . Then, we define the methodology for anomaly detection in the obtained feature space.
Without loss of generality, and in order to develop the LSI model for L C I D S i j , we focus on the g-th routing attack and we consider each neighboring node v j N i as an LSI system, which has been linearized for a small time-window around a given instant, τ . This approach can later be used for all the routing attacks ω g Ω A . We take periodic samples, with a sampling period T, of the relevant local network metrics π a , χ A b and χ N c , to form the time series, π a ( k ) , χ A b ( k ) and χ N c ( k ) ; k = 0 , 1 , 2 , . We propose the multivariate linear regression to model the relationship of the time series in the time domain as,
π a ( k ) = b = 1 A α b χ A b ( k ) 1 X A g ( χ A b ) + c = 1 N β c χ N c ( k ) 1 X N g ( χ N c ) + γ g ( k ) ,
where α b , b , β c , c , γ g ( k ) , are the model parameters to be estimated each period, 1 X A g ( χ A b ) and 1 X N g ( χ N c ) are indicator functions, defined as,
1 X A g ( χ A b ) = 0 if χ A b X A g 1 if χ A b X A g ,
and,
1 X N g ( χ N c ) = 0 if χ N c X N c 1 if χ N c X N c .
Please note that if the χ A b X A g , the corresponding term in the summation is zero and has no effect on b = 1 A α b χ A b ( k ) 1 X A g ( χ A b ) . A similar argument can be made for each χ N c X N g and c = 1 N β c χ N c ( k ) 1 X N g ( χ N c ) . The use of indicator functions allows us to obtain the general state-space representation of the dynamical system, as shown in Section 4.4 and Appendix A.
For each routing attack, we select one local performance metric π a P g , each χ A b X A g , and each χ N c X N g . Because | X A g | = λ a g and | X N g | = λ n g ; the multivariate regression model for the g-th routing attack, has a total number of λ a g + λ n g + 1 parameters. In Equation (8), we make the distinction between the time series of network metrics sensitive to routing attacks, χ A b ( k ) , and the time series of network metrics non-sensitive to attacks, χ N c ( k ) . This distinction allows each attack detector of L C I D S i j to be sensitive to each routing attack ω g Ω A , and not to other factors that may cause performance degradation (e.g., channel fading), of the a-th local performance metric π a P g . It is worth mentioning that in Equation (8), we do not consider the relationship between delayed output and input signal and the current output signal, which is an essential characteristic of dynamical systems; but, the dynamical behavior of L C I D S i j is originated from the input and output signals, which will be defined in Section 4.2.
For the model in Equation (8), we obtain a set of parameters { α b : b = 1 , , λ a } , which relate the time series of the performance metric π a ( k ) , and the time series of the b-th metric sensitive to routing attacks, χ A b ( k ) . Similarly, the set of parameters { β c : c = 1 , , λ n } , represent the relationship between the time series of the network metrics non-sensitive to routing attacks χ N c ( k ) and the local performance metric π a ( k ) ; γ g ( k ) is a free parameter, whose value is fully determined by the data, at each sampling period. The model parameters can be obtained by linear regression, considering a number d, of delayed measurements of the time series, in a sliding-time-window fashion. A longer time-window length d may capture longer time trends in the data, at the expense of more computational workload.

4.2. Desired Dynamic Response and ‘Attack-Constellation’

Let us define the concept of ‘attack-constellation’, as the two-dimensional feature space, in which we can represent all the relevant information to perform anomaly detection, and misuse detection of the known routing attacks ω g Ω A . At a given instant, the system poles of the L C I D S i j , can be represented in this ‘attack-constellation’; and depending on their location, the node v i can decide if the j-th neighboring node is an attacker. Every attack detector for each known attack ω g Ω A , has its corresponding pair of system poles. Given that at any particular instant, there are a total number of M known routing attacks, and because complex poles have a conjugate pair, the system representation of L C I D S i j is of order 2 M . These poles, by definition, tend to be near the origin of the Z -plane in absence of the attack ω g Ω A ; z N g m i n = z ¯ N g m i n = 0 . In addition, in the presence of an attack ω g Ω A , one of the two system poles for that attack detector moves closer to an arbitrary location, z A g m a x = r g cos θ g + j r g sin θ g ; the conjugate pole moves to z ¯ A g m a x = r g cos θ g j r g sin θ g . Therefore, we obtain a region on the Z -plane that represents the absence of the corresponding g-th routing attack. This region is common for all the misuse detectors in L C I D S i j , and is located near the origin of the Z -plane. As an example, consider Figure 3, which shows a total of four known routing attacks, Ω A = { ω 1 , ω 2 , ω 3 , ω 4 } . Please note that a given instant, we can represent the 2 M system poles, and depending on how far they are from the origin, we can assign a probability to identify a potential malicious neighboring node v j N i . Later in this section, we propose a methodology to define the decision boundary for the non-attack region.
The LSI system that models the dynamic behavior of the j-th neighboring node at a given instant, is of order 2 M ; thus, the characteristic equation of the dynamic model of L C I D S i j can be stated as a 2 M degree polynomial Q ( z ) ,
Q ( z ) = g = 1 M Q g ( z ) ;
where each Q g ( z ) is a second-degree polynomial, given by,
Q g ( z ) = 1 + b = 1 A α b η g 1 X A g ( χ A b ) ( z 2 2 z r g cos θ g + r g 2 ) z 2 = 1 + b = 1 A α b η g 1 X A g ( χ A b ) z 1 2 r g cos θ g b = 1 A α b η g 1 X A g ( χ A b ) + z 2 r g 2 b = 1 A α b η g 1 X A g ( χ A b ) .
Please note that each Q g ( z ) , is defined as the characteristic equation of a closed-loop system, whose poles go from z N g m i n = z ¯ N g m i n = 0 , to z A g m a x and z ¯ A g m a x , as the value of b = 1 A α b η g 1 X A g ( χ A b ) , increases from zero to infinity. Each polynomial Q g ( z ) has three parameters, r g , η g and θ g . Each parameter θ g is chosen arbitrarily for each routing attack, this θ g defines the trajectories that the pair of poles of Q g ( z ) will follow. The values of the parameters r g and η g must be found in such a way that optimize the detection performance for the g-th routing attack detector. Later in this section, we propose a methodology to find these optimal parameters values.

4.3. Input and Output Signals

As previously stated, the multivariate linear regression model in Equation (8), does not capture the desired dynamical behavior of the system, whose poles on the Z -plane move on the trajectories defined by the ‘attack-constellation’ diagram in Figure 3. That desired dynamical behavior of the system comes from the input signals u A b ( k ) and u N c ( k ) , and output signal y g ( k ) , defined as,
u A b ( k ) = χ A b ( k ) + α b η g 1 y a ( k ) 2 r g cos θ g α b η g 1 y a ( k 1 ) + r g 2 α b η g 1 y a ( k 2 ) ,
u N c ( k ) = χ N c ( k ) ,
y g ( k ) = π a ( k ) γ g ( k ) ,
where a = 1 , , λ p g , b = 1 , , λ a g and c = 1 , , λ n g . Derivation of the input and output signals that lead to the desired dynamic response of an individual attack-detection model can be found in the Appendix in [15]. The analysis in the following sections is different from that presented in [15].

4.4. State-Space Representation

In this subsection, we present the state-space representation of the LSI system that models the dynamic behavior of L C I D S i j . This state-space representation is obtained from the parametric autoregressive models introduced in Section 4.1, and the input–output signal definitions in Section 4.3. There is one autoregressive model, and two system poles, for each routing attack ω g Ω A , which lead to the LSI system of order 2 M described in Section 4.2. The derivation of the proposed state-space representation can be found in Appendix A.
The state transition equation is given by,
x ( k + 1 ) = A ( k ) x ( k ) + B ( k ) u ( k ) ,
where x ( k + 1 ) represents the state vector at the next time period, x ( k ) is the current state vector, u ( k ) is the input signal vector, A ( k ) is the state matrix, and B ( k ) is the input-to-state matrix.
The state transition model in (16) in matrix form is,
x 1 ( 1 ) ( k + 1 ) x 1 ( 2 ) ( k + 1 ) x 2 ( 1 ) ( k + 1 ) x 2 ( 2 ) ( k + 1 ) x M ( 1 ) ( k + 1 ) x M ( 2 ) ( k + 1 ) ( 2 M × 1 ) = A 1 ( k ) ( 2 × 2 ) 0 ( 2 × 2 ) 0 ( 2 × 2 ) 0 ( 2 × 2 ) A 2 ( k ) ( 2 × 2 ) 0 ( 2 × 2 ) 0 ( 2 × 2 ) 0 ( 2 × 2 ) A M ( k ) ( 2 × 2 ) ( 2 M × 2 M ) x 1 ( 1 ) ( k ) x 1 ( 2 ) ( k ) x 2 ( 1 ) ( k ) x 2 ( 2 ) ( k ) x M ( 1 ) ( k ) x M ( 2 ) ( k ) ( 2 M × 1 ) + B 1 ( k ) ( 2 × [ A + N ] ) B M ( k ) ( 2 × [ A + N ] ) ( 2 M × [ A + N ] ) u A 1 ( k ) u A A ( k ) u N 1 ( k ) u N N ( k ) ( [ A + N ] × 1 ) ,
where each state variable has a subindex that relates it to a given attack ω g ; similarly, the superindex in each state variable denotes the time period from which that state variable was derived.
Each submatrix A g ( k ) in (17), is defined as,
A g ( k ) = 2 r g cos θ g b = 1 A α b η g 1 X A g ( χ A b ) 1 + b = 1 A α b η g 1 X A g ( χ A b ) 1 r g 2 b = 1 A α b η g 1 X A g ( χ A b ) 1 + b = 1 A α b η g 1 X A g ( χ A b ) 0 ( 2 × 2 ) ,
and each submatrix B g ( k ) is defined as,
B g ( k ) = 0 0 α 1 1 X A g ( χ A 1 ) 1 + b = 1 A α b η g 1 X A g ( χ A b ) β N 1 X N g ( χ N N ) 1 + b = 1 A α b η g 1 X A g ( χ A b ) ( 2 × [ A + N ] ) .
Please note that the matrices A ( k ) and B ( k ) in (16), are time-varying, because each submatrix A g ( k ) and B g ( k ) depend on the last estimated values of the multivariate linear model parameters α b , and β c , from Equation (8).
The output equation is,
y ( k ) = C x ( k ) ,
y 1 ( k ) y 2 ( k ) y M ( k ) ( M × 1 ) = 1 0 0 0 0 0 0 1 0 0 0 0 0 1 0 ( M × 2 M ) x 1 ( 1 ) ( k ) x 1 ( 2 ) ( k ) x 2 ( 1 ) ( k ) x 2 ( 2 ) ( k ) x M ( 1 ) ( k ) x M ( 2 ) ( k ) ( 2 M × 1 ) ,
where y ( k ) is the output signal vector and C is the state-to-output matrix.
The system poles z i j , which model the dynamical behavior of L C I D S i j , are obtained from the state-space representation as,
z i j = z i j : | z i j I A ( k ) | = 0 ;
to then, be used as features by L C I D S i j to detect anomalous network behavior or each known routing attack ω g Ω A .

4.5. Misuse-Detection Decision Rule

The misuse detection part of L C I D S i j , performs a classification task, in which it has to assign the current neighbor v j to a class from the set { C A g , C N g } ; where C A g , corresponds to the class in which the j-th neighboring node is identified as an ω g -attacker; and C N g , is the class that corresponds to the non- ω g -attacker nodes. This classification is made by considering the system poles z i j , in the reduced feature space of the Z -plane, and a decision rule h g ( | z | ) , for each attack detector, g = 1 , 2 , , M .
Recall that the optimal values for the parameters r g and η g have not been defined for any Q g ( z ) . Given concrete values for r g and η g , we define a probability density function (pdf) for the modulus of the pole locations when the network is not under the g-th routing attack, | z N g | = | z ¯ N g | , as f N g ( | z N g | ) . Similarly, we define the pdf for the modulus of the pole locations, | z A g | = | z ¯ A g | , when there is an attack ω g (with severity ψ g ), as f A g ( | z A g | ) . Then, we use decision theory to define each decision rule h g ( | z | ) that allows L C I D S i j to detect the g-th routing attack ω g . Since we define the pdf of the pole clusters as a function of the modulus of the poles, the decision rule h g ( | z | ) can be defined with the decision threshold t h g . Thus, the decision rule h g ( | z | ) , can be expressed as,
h g ( | z | ) = C A g ,
if and only if
| z | > t h g ,
where the decision threshold t h g , is evaluated at the pole z associated with the constellation branch of ω g , and it is defined as,
t h g = z : f A g ( | z A g | ) | z = f N g ( | z N g | ) | z .
Let P g ( ϵ ) be the probability of L C I D S i j making a classification mistake. Please note that the decision threshold t h g , and the probability of error P g ( ϵ ) , depend on the selected values of the parameters r g and η g , for the corresponding attack detector. Thus, we state P g ( ϵ ) as a function of r g and η g , P g ( ϵ ) = f g ( r g , η g ) . Then, we define some constraints as follows; the expected values of the poles modulus in absence of attack are restricted by a small value ζ g 0 , E [ | z N g | ] ζ g . Another restriction is that the modulus of the expected value of the poles during an attack condition must be greater than ζ g and smaller than an arbitrary value ξ g ; ζ g < E [ | z A g | ] < ξ g . Finally, we select the values r g and η g that minimize probability of error P g ( ϵ ) , i.e.,
minimize r g , η g P g ( ϵ ) = f g ( r g , η g ) , subject to E [ | z N g | ] ζ g , ζ g < E [ | z A g | ] < ξ g .

4.6. Anomaly Detection

As previously stated, the ‘attack-constellation’ contains a pair of system poles that tend to move away from the origin on the Z -plane, as the attack severity metric ψ g , increases for each corresponding routing attack ω g Ω A . Let’s assume that we know the probability distribution for the poles in the absence of the g-th attack f N g ( | z N g | ) , for each known routing attack ω g Ω A considered in the ‘attack-constellation’. Then, we can obtain the mean μ g , and standard deviation σ g , for each f N g ( | z N g | ) , to form the column vector Φ R 2 M , given by,
Φ = [ μ 1 , σ 1 , , μ M , σ M ] .
This vector Φ contains relevant statistical information about the non-anomalous dynamic behavior of a neighboring node v j N i . The statistical information in Φ can be obtained from a large set of historic non-anomalous data. Then, we can use this non-anomalous vector Φ as a reference to perform online outlier detection. Consider that we obtain the mean μ g , d ϕ , and standard deviation σ g , d ϕ , of the moduli of the ‘attack-constellation’ poles; those statistic metrics are obtained from a small time-window d ϕ that includes the current and previous system poles in the ‘attack-constellation’. Then, with those statistical values, we define the vector ϕ R 2 M , as,
ϕ = [ μ 1 , d ϕ , σ 1 , d ϕ , μ M , d ϕ , σ M , d ϕ ] .
Please note that the vector ϕ contains relevant temporal and statistical information about the dynamical behavior of the neighboring node v j N i . Therefore, for non-anomalous data, vector ϕ must be similar to the reference vector Φ . We can use the Euclidean distance s Φ , as a measure of similarity between ϕ and Φ , as,
s Φ = | | Φ ϕ | | 2 = ( μ 1 μ 1 , d ϕ ) 2 + + ( σ M σ M , d ϕ ) 2 .
With historical non-anomalous data, we can obtain an empirical cumulative probability distribution (cdf) F s ϕ ( s ϕ ) for non-anomalous data. With this cdf, we can obtain a decision rule h Φ , to decide if the current dynamic behavior of the j-th neighboring node v j N i is anomalous, and that neighboring node belongs to the subset of neighboring nodes with anomalous behavior N A N i . The decision rule for the anomaly-detection engine of L C I D S i j is given by,
h Φ = N A
if and only if
s Φ > t h Φ ,
where the decision threshold t h ϕ , is defined as,
t h Φ = s Φ : F s Φ ( s Φ ) = p Φ ;
p Φ [ 0 , 1 ] , is a design parameter that represents a probability value of the non-anomalous data instances correctly classified as non-anomalous. The value of p Φ must be selected to be close to one because it represents the non-anomalous detection accuracy, thus, the closer the value of p Φ to one, the lower the number of false positives in anomaly detection.
Figure 4a, shows an example of an ‘attack-constellation’ of one known attack, the reference vector Φ R 2 , and several instances of the vector ϕ . In Figure 4b, we present the empirical cdf for the distance metric s Φ , from the example in Figure 4a, and the corresponding decision threshold t h Φ .

4.7. On the Implementation

Each network node v i V τ , must run online the L C I D S i j for each neighboring node v j N i ; and each L C I D S i j is designed by a supervised learning approach, which consists of a training stage and the online detection.

4.7.1. Training Stage

During the training stage, we determine the decision threshold t h g and the optimal values for the parameters r g and η g , used to detect the g-th routing attack ω g Ω A ; as well as the anomaly decision threshold t h Φ . The value of each parameter θ g , can be chosen arbitrarily; all the parameters θ g must be different among each other, because each θ g defines a branch of the ‘attack-constellation’. The decision thresholds t h g and t h Φ , and the optimal parameters r g and η g are obtained from a set of training data { z A g , z N g } , which contains a set of attack poles z A g labeled as C A g , and a set of non-attack poles z N g , labeled as C N g .
The set of label data z A g is obtained by the i-th node v i V τ , by collecting input and output signals at a time when there is an ω g attack present in the network. For the misuse-detection part of L C I D S i j , we use those measurements grouped in d delayed samples, we obtain the system parameters of the multivariate linear regression model (8), α b and β c , b and c . Those parameters are valid for a time-window that starts at k d and ends at k. We can define some search regions for the parameters r g and η g . After that, we take a value of that search region ( r g , η g ) , to define the system input signals, u A b ( k ) and u N c ( k ) , and the output signal y a ( k ) . Then, we find the pole clusters, | z A g | , | z N g | , the decision threshold t h g and the probability of error P g ( ϵ ) = f g ( r g , η g ) for those particular values of r g and η g . We repeat this process for all the pair values of values ( r g , η g ) to obtain the probability of error as a function P g ( ϵ ) = f g ( r g , η g ) . Finally, we can solve the optimization problem in (26) to find the optimal parameters r g , η g and their respective t h g and P ( ϵ ) .
To obtain the anomaly-detection threshold t h Φ , we use the non-attack data { z N g : g = 1 , , M } to obtain the vector Φ . This vector Φ , is a point of reference to characterize non-anomalous neighboring nodes. Then, we compare each instance of the vector ϕ with the reference vector Φ . It is worth mentioning that the mean and standard deviation values that compose each instance of the vector ϕ , are obtained in a sliding-time-window fashion from the non-anomalous training data { z N g : g = 1 , , M } . Those statistic parameters obtained from the time-window that starts at the time period k d Φ , and ends at the k-th period. With each instance of ϕ and the reference vector Φ , we can obtain a set of distance metrics s Φ , and their respective cdf F s Φ ( s Φ ) , to finally obtain the anomaly decision threshold t h Φ .
Figure 5, shows the training process to find the decision thresholds t h g , t h Φ and the optimal parameters r g and η g .

4.7.2. Online Misuse and Anomaly Detection

Figure 5, describes online attack-detection process of L C I D S i j to identify each g-th routing attack, or anomalous dynamic behavior of each j-th neighboring node v j N i . The online attack-detection starts with the misuse decision threshold t h g , the anomaly decision threshold t h Φ , and the optimal parameters r g and η g , obtained during the training stage. We form the input signals u A b ( k ) and u N c ( k ) , and the output signal y a ( k ) from the multivariate linear regression model parameters and variables in (8). Then, we obtain the system poles of the ‘attack-constellation’ for that sampling period, and we compare the modulus of those poles to the decision threshold t h g to decide if the neighboring node v j N i is an attacker. To find anomalous neighboring nodes, we compare the current value of the vector ϕ , to the reference vector Φ . Then, we obtain the current distance s Φ , and compare it with the decision threshold t h Φ . Once an attacker has been identified, it can be added to a blacklist and the network administrator will receive an alert of the event. Please note that the data collection and the computation for intrusion detection is performed locally and individually by each network node to save network resources; however, by adding the attacker to a blacklist, each individual action causes a global impact as the attacker node is isolated from the network.

4.7.3. On the Computational Workload

In this subsection, we discuss on the computational workload required to implement the proposed technique, L C I D S i j , on a network node, to identify attackers and anomalous behaviors online, for each neighboring node v j N i .
For each misuse detector in L C I D S i j , there exists a branch in the ‘attack-constellation’, and a modeling process that starts with a multivariate regression model. The number n, of parameters of the multivariate regression model in (8) equals the number of input signals considered. Please note that n = λ a g + λ n g + 1 < A + N + 1 , because | X A g | = λ a g < | X A | = A ; | X N g | = λ n g < | X N | = N . For each attack detector considered, L C I D S i j has to estimate the parameters α b , β c and γ g , by the least squares method, given the previous d, delayed measurements of the time series, π a ( k ) , χ A b ( k ) and χ N c ( k ) . The least squares method requires three matrix multiplications and an inverse matrix operation. It begins by multiplying two matrices, with dimensions n × d and d × n , respectively, to obtain an n × n matrix. Then, we need to perform the most expensive operation in the least squares method that consists of calculating the inverse of the obtained matrix, whose dimensions are n × n . The result must be multiplied for a matrix, whose dimensions are n × d . Then, the obtained matrix has dimensions n × d , and must be multiplied by a d × 1 vector, to obtain the model parameters in a vector of dimensions n × 1 . The same operation must be repeated for each known routing attack detector in L C I D S i j .
Recall that the characteristic equation from which the model in L C I D S i j originates, Q ( z ) is of order 2 M by definition, and it is composed of a total number M of second order polynomials, Q g ( z ) : g = 1 , , M . To find the system poles of the ‘attack-constellation’, we need to find the roots of each second-degree polynomial Q g ( z ) , which have a closed solution. This implies a potential computational cost reduction when compared to the calculation of the eigenvalues of the characteristic equation in (22).
The misuse-detection component of L C I D S i j , uses a decision rule h g ( | z | ) to make a decision about the j-th neighboring node. This decision rule compares the estimated poles of the ‘attack-constellation’ to the corresponding decision threshold t h g .
For the anomaly-detection engine of L C I D S i j , we need to calculate the mean values μ g , d Φ , and standard deviations σ g , d Φ , of the moduli of the ‘attack-constellation’ poles, considering the current and previous d Φ 1 calculated poles. Then, we obtain the current distance metric s Φ , between two vectors Φ R 2 M and ϕ R 2 M , and compare it to the anomaly decision threshold t h Φ .
From the previous analysis, we can conclude that as the number of known routing attacks increases, the computational cost of L C I D S i j increases as well. In order to keep the computational workload required by L C I D S i j at a minimum, small models, with a small number of parameters, are desirable.

4.7.4. On the Time-to-Attack Detection

Please note that the time required by L C I D S i j to identify an attack ω g Ω A launched by the j-th neighboring node, depends on the time-window length d, used to estimate the model parameters. The multivariate linear regression model in (8) has a total of n = λ a + λ n + 1 parameters; d n . By increasing the number of input signal used for the parameter estimation, we may improve the attack-detection performance, but at the same time, the necessary time to detect the attack ω g increases. Similarly, the time to detect anomalies, depends on the length of the time-window d Φ . A larger length of d Φ reduces the number of false alarms, at the expense of increasing the time required to detect anomalies.

4.8. On Unknown Attacks

As previously stated, as new vulnerabilities are discovered in routing protocols, the number of known routing attacks would be continuously increasing. The anomaly-detection capabilities of L C I D S i j can help us detect these new vulnerabilities, to then design the proper attack detectors, and include them into the ‘attack-constellation’. Please note that because the system poles of the model in each L C I D S i j move on predefined trajectories, they do not interfere with each other. Thus, we can repeat the training stage described in Section 4.7 to train as many new branches as necessary and include them to the ‘attack-constellation’, without affecting the attack-detection performance of the previously designed misuse detectors. The main drawback of this approach is the increasing complexity of the required computational resources of the technique. Collaborative approaches, in which different nodes detect a given subset of known attacks, might help mitigate the increasing complexity problem of the technique, and are a possible future research direction.

5. Study Cases

To test the attack-detection performance of the proposed technique, a series of simulations were performed on an in-house developed event driven simulator, described in [15]. It is worth mentioning that to present a fair comparison of the proposed method with the prior [16], we are replicating the simulations presented in [16], comparing the misuse-detection results and obtaining anomaly-detection results of LC-IDS.

5.1. Simulation Parameters

We performed a series of 56 simulations for a wide variety of network scenarios. The simulation parameters are summarized in Table 2. The simulation period used is T = 0.05 s. The total simulated time was 20 s per each simulation. Each simulated scenario contains one attacker node, which launched the corresponding routing attack after the first 10 s of attack-free simulation. Four routing attacks were considered in the experiments, ω 1 = route request flooding (RREQF), ω 2 = selective forwarding (SF), ω 3 = black hole (BH) and ω 4 = worm hole (WH); Ω A = { ω 1 , ω 2 , ω 3 , ω 4 } .
The simulations are divided in three experiments, the Node Density Experiment, the Attack Severity Experiment, and the Mobility Experiment. For the first experiment, we study the effects of node density and the position of the attacker on the attack-detection and anomaly-detection performance. We simulated the nodes at a random fixed position. The attack severity was fixed for all the attacks, ψ g = 0.1 . The total number of nodes in the scenario increased from the set, { 65 , 75 , 85 } . To assess the attacker’s location impact, we repeat those experiments varying the attacker node position for each node density, first, the malicious node was set at the center of the scenario, then, it was set at the edge of the scenario. For the second experiment, we analyze the effects of different attack severity values on the misuse and anomaly-detection performance for each routing attack ω g Ω A . No mobility was considered for this experiment. The attack severity was modified from the set { 0 , 0.1 , 0.3 , 0.5 , 0.7 } . For the RREQ flooding attack, the attack severity, ψ g , was defined as the bandwidth consumption by the RREQ messages, normalized by the maximum channel capacity of the attacker’s links. For the selective forwarding, black hole and worm hole attacks, the attack severity was defined as the probability of the attacker discarding data packets. For each routing attack, ω g , the attack severity, ψ g [ 0 , 1 ) . The third experiment compares the effects of mobility on the attack-detection and anomaly-detection performance, attack severity is fixed for all the attacks, ψ g = 0.1 , the number of simulated nodes is also fixed at 65. The mobility model used for this experiment is the random way point model, where each node speed is limited by a maximum speed value from the set, { 2 , 3 , 4 , 5 } m/s.

5.2. Simulation Results

Each attack detector L C I D S i j , is obtained by the methodology described in Section 4.7, to detect each routing attack ω g Ω A , and to perform anomaly detection, for the three experiments.
The attack-detection performance of the misuse-detection component of each L C I D S i j , is evaluated in terms of detection accuracy ( D A g ), the number of false positives ( F P g ) and the number of false negatives ( F N g ), for all the simulated scenarios. We are interested in testing the robustness of the proposed technique to a wide variety of network conditions, so that it could be implemented in low power devices. Thus, the time-to-attack-detection and computational requirements are minimal for all the analyzed scenarios. To achieve this minimization of computational resources, we consider the smallest possible detection model for each case. This smallest possible model consists of only one input signal and one output signal per routing attack; and those models are parameterized each time period using the minimum length possible for the misuse-detection time-window d = 1, and the minimum time-window for the anomaly detection d Φ = 2. The optimal parameters of the ‘attack-constellation’, r g and η g , are presented for each case. Please note that by considering only one input signal per attack detector and a minimum length of the window size d = 1 , the parameter estimation of the autoregressive model in (8) can be obtained by a simple division, eliminating the expensive operation of matrix inversion in the least squares approach proposed in Section 4.1. As mentioned in Section 4.7.3, we can obtain the roots of M = 3 second-degree polynomials by solving the general quadratic equation, which significantly reduces computation when compared to finding the roots of the characteristic polynomial in Equation (22).
To test the anomaly-detection performance of L C I D S i j , for each simulated scenario, we design an ‘attack-constellation’ that does not include the simulated routing attack in that particular scenario. For example, if the malicious node in one scenario launches the routing attack ω 3 , we design the attack-constellation to include the set of known attacks Ω A = { ω 1 , ω 2 , ω 4 } . For each experiment we are considering a total of three known attacks. The fourth attack class is considered to be unknown to the IDS and is used to test the anomaly-detection performance of LC-IDS. Then we use the anomaly-detection accuracy ( D A Φ ), the number of false positive ( F P Φ ), and the number of false negatives ( F P Φ ), for that ‘attack-constellation’ and the previously unknown routing attack.
In Table 3, we show the input and output signals that were considered to obtain the multivariate linear regression parameters, for each L C I D S i j .
The network metrics used to define the input and output signals of the LSI system, constitute the time series π a ( k ) , χ A b ( k ) and χ N c ( k ) in Table 3, and are defined as,
  • The received header bits, is a metric that measures the number of packet header bits received from the neighboring node’s link to the attacker node at each simulation period, k.
  • The total received bits, refers to the total number of received bits during one simulation period.
  • The received bits per link, sent bits per link and received packets focus on the link of interest between the neighboring node and the attacker.
  • The routing frequency of the link, measures the number of times that the link of interest appears as next hop in the routing tables normalized by the number of active routes.
To reduce the time-window length d used to obtain the model parameters, we include a pre-processing of the input and output signals before the adaptive fitting of the linear models. In this pre-processing stage, we filter the signals by a Butterworth low-pass filter. The main function of the low-pass filter, is to smooth the signals and to improve the signal-to-noise ratio. The Butterworth filter was designed as an analog low-pass filter with a cut off frequency ω c = 0.24 Hz and then it was converted to its digital form by the Tustin’s bilinear transform with a sampling period T = 0.05 s. The transfer function in the Z -plane, of the digital low-pass filter is,
H B t t r ( z ) = 0.000346 z 2 + 0.00069217 z + 0.000346 z 2 1.947 z + 0.9481 .
The second order filter was used to smoothen all the input and output signals for each simulated scenario. Please note that the misuse-detection evaluation parameters presented in Table 4, Table 5, Table 6 and Table 7 are similar to those presented in [16].

5.2.1. Node Density Experiment

In Table 4, we present the attack-detection performance for the node density experiments, in which the attack node was placed at the center of the scenario. In general, we achieve good attack-detection performance for all the simulated scenarios, and for all the known attacks. The worst attack-detection performance ( D A = 97.346 % ) was obtained for the ω 2 attack, for the 85-node scenario; the rest of misuse-detection accuracy results are > 99.000 % . Please note that this misuse-detection performance results were obtained considering only one input signal per known attack, and a minimum length of the time-window d = 1 . This implies that the model parameters, α b , can be found by a single floating-point operation (a division), for each attack detector in L C I D S i j , every simulation period, T. Thus, in case it is necessary, we could improve the misuse-detection performance by considering more input signals or by increasing the time-window length d, at the expense of a higher computational workload. The optimal ‘attack-constellation’ parameters r g , η g and t h g , were different for each simulated scenario, which implies that if the network conditions change significantly, it is necessary to obtain new optimal parameters for the ‘attack-constellation’.
The anomaly-detection performance results are shown at the bottom of the misuse-detection results, for each simulated scenario. Most of the anomaly-detection accuracy results are good ( D A > 99.000 % ), even for the small time-window length d Φ . Please note that for all the anomaly-detection results, the number of false positives F P Φ < 0.001 % , and the number of false negatives F N Φ contribute to most of the anomaly-detection error. The worst anomaly-detection accuracy ( D A Φ = 50.001 % ), was obtained for the case of 85 simulated node and an ω 2 attack. This implies that in the presence of an ω 2 attack, the attack-constellation composed of three branches, corresponding to ω 1 , ω 3 and ω 4 ; the anomaly detection component of L C I D S i j will detect the anomalous behavior of the j-th neighboring node roughly one of every two sampling periods. This alert triggering rate might be sufficient to be noticed.
In Table 5 we show the results for the simulated scenarios, in which we placed the attacker node at the edge of the scenario. Please note that we obtain better attack-detection performance for the cases in which the attacker node is placed at the center of the scenario than for the cases in which the attacker was placed at the edge of the scenario. This is due to the fact that when the attacker is at the center of the scenario, it has a larger number of neighboring nodes; thus, the attack has a larger impact on network performance. A larger impact on network performance, implies that it is easier to detect the routing attack.

5.2.2. Attack Severity Experiment

Table 6, summarizes the misuse-detection and anomaly-detection performance for the different attack severity experiments. Please note that we achieve better results, compared to the node density experiments. Most of the D A > 99.000 % for most of the simulated scenarios. The worst detection accuracy ( D A = 88.162 % ) was obtained for the ω 4 and ψ 3 = 0.3 scenario. This is because, the greater attack severity values ψ g , are associated with a higher impact on network performance degradation, making easier for the misuse-detection engine of L C I D S i j to identify those attacks. As with the previous case, the time-window length for the adaptive fitting of the model parameters was d = 1 . Thus, the model parameters, α b , can be found by a division for each attack-detection model I D S i j , ω g , every simulation period, k T . This implies a minimum computational workload of L C I D S i j , and a minimum time-to-misuse-detection-time. Better misuse-detection results could be obtained by increasing the time-window length d, or by considering more input signals into the dynamical model of L C I D S i j . The optimal ‘attack-constellation’ parameters r g , η g and t h g , are different for each simulated scenario.
As with the number of nodes experiment, the worst anomaly-detection results ( D A Φ = 50.001 % ), will produce a triggering alarm rate sufficient to be noticed. In addition, the majority of the anomaly-detection error is produced by the number of false negatives F N Φ , i.e., anomalous neighboring nodes detected as non-anomalous. The number of false positives is minimum, because of the way that the anomaly decision threshold t h Φ is defined.

5.2.3. Mobility Experiment

In Table 7, we summarize the attack-detection performance for the different mobility simulations. Please note that the mobility experiment results are not as good as for the previous experiments. This is originated from the highly dynamic network topology, which resulted in high uncertainty and dispersion of the model parameters, α b . For the misuse-detection case, most of the D A > 90 % , the worst D A g = 80.539 % was obtained for ω 4 and a node speed of 4 m/s. Most of the anomaly-detection results D A Φ > 98.000 % , with the worst case D A Φ = 50.001 % , for the ω 1 and 5 m/s case. However, better attack-detection results could be achieved by increasing the time-window length, d, or by considering more input signals in the dynamical models of L C I D S i j . Please note that similarly to the previous experiments results, the optimal ‘attack-constellation’ parameters r g , η g and t h g , are different for each simulated scenario.

6. Conclusions and Future Work

In this work, we have developed a general mathematical framework based on the theory of dynamical systems, to identify routing attacks and anomalous behaviors from the local perspective of an individual node in RWN. We expand the main idea of the root locus-misuse-detection technique presented in recent literature. By this dynamical systems perspective, we take advantage of the causal and temporal dependencies in the network data used to identify routing attacks. This allows us to overcome some of the open challenges in the state of the art of IDS for RWN described in Section 2.3, which are listed as follows,
  • By modeling the dynamic behavior of neighboring nodes as a piecewise LSI system, we can represent all the relevant information to identify routing attacks on a two-dimensional feature space, the Z -plane. This can be thought of as an intrinsic dimensionality-reduction capability of the proposed technique. This reduction in the number of feature space dimensions does not require any additional dimensionality-reduction techniques as could be the case of Principal Component Analysis (PCA) or an autoencoder.
  • By obtaining the state-space model for each L C I D S i j , we can represent the system poles for all the attack detectors on the same feature space, Z -plane. This allows us to derive the ‘attack-constellation’ concept, which we use to perform misuse and anomaly detection.
  • We develop a framework in which we can consider as many neighboring nodes and routing attacks, as necessary. In the case of the appearance of an unknown routing attack, we can repeat the training stage described in Section 4.7 to design a new attack detector and add a new branch to the current ‘attack-constellation’, without affecting the detection performance of the already considered attack detector. This property makes LC-IDS a flexible and scalable technique.
  • The proposed intrusion detection technique is robust to a wide range of network conditions and is capable of online attack-detection and anomaly-detection without imposing excessive computing overhead and without consuming any network bandwidth, as can be noted from the detection accuracy and time-to-attack-detection results, and from the fact that each L C I D S i j uses local information obtained from received data packets and incoming links to detect malicious neighboring nodes.
Please note that the experimental evidence suggests that the proposed technique can overcome some of the open challenges of the alternative approaches to intrusion detection mentioned in Section 2.1. Due to the local data collection and computation, LC-IDS does not consume network bandwidth, unlike collaborative approaches. Because LC-IDS models the dynamical behavior of neighboring nodes as linear systems for a given instant, each neighboring node can be represented by a quasi-static pole distribution on the Z -plane, independently of the number of input signals considered; this dimensionally reduced feature space in which attack/anomaly detection takes place simplifies the problem of dynamic probability distributions and decision thresholds of statistical approaches. This dimensionality-reduction property that arises naturally in LC-IDS also implies a simplification when compared to machine-learning approaches that make use of feature extraction and dimensionality-reduction techniques in addition to the classification approach required for intrusion detection. By the other hand, our approach cannot overcome some of the open challenges in the literature; in the case of a network scenario with many nodes and high node mobility, LC-IDS will need to consider more than one input signal per attack detector, increasing significantly the computational requirements of the technique, as can be noted from Section 4.7.3.
As future work, we could explore the idea of using control theory to not just identify malicious neighboring nodes, but to allow an intelligent controller to take action on the network. This controller could take advantage of the two-dimensional latent space obtained by each L C I D S i j that represents the dynamic behavior of neighboring nodes to control individual nodes behavior and their respective impact on global network performance to adaptively optimize the global network performance parameters (e.g., throughput, end-to-end delay).

Author Contributions

Conceptualization, J.Z.-M., R.V.-H. and C.V.-R.; methodology, J.Z.-M. and R.V.-H.; software, J.Z.-M.; validation, J.Z.-M., R.V.-H., C.V.-R. and M.Z.; formal analysis, J.Z.-M.; investigation, J.Z.-M.; resources, C.V.-R.; data curation, J.Z.-M.; writing—original draft preparation, J.Z.-M.; writing—review and editing, R.V.-H., C.V.-R. and M.Z.; visualization, J.Z.-M.; supervision, C.V.-R.; project administration, C.V.-R.; funding acquisition, C.V.-R. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the SEP-CONACyT Research Projects under Grants 255387 and 256237, the School of Engineering and Sciences and the Telecommunications and Networks Focus Group at Tecnologico de Monterrey.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Derivation of the State-Space Representation

In this appendix, we obtain the state-space representation of the LSI system that models the dynamic behavior of the j-th neighboring node, L C I D S i j . We start from the set of multivariate linear regression equations. There is one equation per known attack ω g Ω A , g = 1 , 2 , , M . The set of multivariate linear regression equations is,
(A1) π 1 ( k ) = b = 1 A α b χ A b ( k ) 1 X A 1 ( χ A b ) + c = 1 N β c χ N c ( k ) 1 X N 1 ( χ N c ) + γ 1 ( k ) , (A2) π M ( k ) = b = 1 A α b χ A b ( k ) 1 X A M ( χ A b ) + c = 1 N β c χ N c ( k ) 1 X N M ( χ N c ) + γ M ( k ) .
By substituting each u A b ( k ) , u N c ( k ) and y g ( k ) , from Equations (13)–(15), we obtain,
(A3) y 1 ( k ) = b = 1 A α b u A b ( k ) 1 X A 1 ( χ A b ) + b = 1 A α b η 1 y 1 ( k ) 1 X A 1 ( χ A b ) + 2 r 1 cos θ 1 b = 1 A α b η 1 y 1 ( k 1 ) 1 X A 1 ( χ A b ) r 1 2 b = 1 A α b η 1 y 1 ( k 2 ) 1 X A 1 ( χ A b ) + c = 1 N β c u N c ( k ) 1 X N 1 ( χ N c ) , (A4) y M ( k ) = b = 1 A α b u A b ( k ) 1 X A M ( χ A b ) + b = 1 A α b η M y M ( k ) 1 X A M ( χ A b ) + 2 r M cos θ M b = 1 A α b η M y M ( k 1 ) 1 X A M ( χ A b ) r M 2 b = 1 A α b η M y M ( k 2 ) 1 X A M ( χ A b ) + c = 1 N β c u N c ( k ) 1 X N M ( χ N c ) .
Applying the Z -transform, and then solving for each y g ( k ) , we obtain,
(A5) Y 1 ( z ) = z 1 Y 1 ( z ) 2 r 1 cos θ 1 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) z 2 Y 1 ( z ) r 1 2 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + U A b ( z ) b = 1 A α b 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + U N c ( z ) c = 1 N β c 1 X N 1 ( χ N c ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) , (A6) Y M ( z ) = z 1 Y M ( z ) 2 r M cos θ M b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) z 2 Y M ( z ) r M 2 b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U A b ( z ) b = 1 A α b 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U N c ( z ) c = 1 N β c 1 X N M ( χ N c ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) .
Regrouping terms,
(A7) Y 1 ( z ) = z 1 Y 1 ( z ) 2 r 1 cos θ 1 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + z 1 Y 1 ( z ) r 1 2 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + U A b ( z ) b = 1 A α b 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + U N c ( z ) c = 1 N β c 1 X N 1 ( χ N c ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) , (A8) Y M ( z ) = z 1 Y M ( z ) 2 r M cos θ M b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + z 1 Y M ( z ) r M 2 b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U A b ( z ) b = 1 A α b 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U N c ( z ) c = 1 N β c 1 X N M ( χ N c ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) .
The state variable can be defined as,
(A9) X 1 ( 1 ) ( z ) = Y 1 ( z ) , (A10) X 1 ( 2 ) ( z ) = z 1 X 1 ( 1 ) ( z ) r 1 2 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) , (A11) X M ( 1 ) ( z ) = Y M ( z ) , (A12) X M ( 2 ) ( z ) = z 1 X M ( 1 ) ( z ) r M 2 b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) .
Thus, the state transition equations are,
(A13) z X 1 ( 1 ) ( z ) = X 1 ( 1 ) ( z ) 2 r 1 cos θ 1 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + X 1 ( 2 ) , (A14) z X 1 ( 2 ) ( z ) = X 1 ( 1 ) ( z ) r 1 2 b = 1 A α b η 1 1 X A 1 ( χ A b ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) + U A b ( z ) b = 1 A α b 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U N c ( z ) c = 1 N β c 1 X N 1 ( χ N c ) 1 + b = 1 A α b η 1 1 X A 1 ( χ A b ) , (A15) z X M ( 1 ) ( z ) = X M ( 1 ) ( z ) 2 r M cos θ M b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + X M ( 2 ) , (A16) z X M ( 2 ) ( z ) = X M ( 1 ) ( z ) r M 2 b = 1 A α b η M 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U A b ( z ) b = 1 A α b 1 X A M ( χ A b ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) + U N c ( z ) c = 1 N β c 1 X N M ( χ N c ) 1 + b = 1 A α b η M 1 X A M ( χ A b ) .
The output equations are,
(A17) Y 1 ( z ) = X 1 ( 1 ) ( z ) , (A18) Y M ( z ) = X M ( 1 ) ( z ) .
Applying the inverse Z -transform, and arranging in matrix form the obtained state transition equations, we obtain the state equations in the time domain, as in Equation (16). Similarly, the output equations in the time domain and in matrix form are the same as the ones in Equation (20).

References

  1. Mller, R.; Bajgin, S.; Purtova, E.; Sezgin Alp, S.; Karakoc, M.; Yardim, G.; Barbour, J.; Jonsson, P.; Carson, S.; Torres, A.; et al. Ericsson Mobility Report, Ericsson, Stockholm, June 2019. Available online: https://www.ericsson.com/49d1d9/assets/local/reports-papers/mobility-report/documents/2019/ericsson-mobility-report-june-2019.pdf (accessed on 30 November 2021).
  2. Qiao, X.; Ren, P.; Nan, G.; Liu, L.; Dustdar, S.; Chen, J. Mobile web augmented reality in 5G and beyond: Challenges, opportunities, and future directions. China Commun. 2019, 16, 141–154. [Google Scholar] [CrossRef]
  3. Feng, D.; She, C.; Ying, K.; Lai, L.; Hou, Z.; Quek, T.Q.S.; Li, Y.; Vucetic, B. Toward Ultrareliable Low-Latencey Communications. IEEE Veh. Technol. Mag. 2019, 14, 94–102. [Google Scholar] [CrossRef]
  4. El-Mougy, A.; Hattab, G. Reconfigurable wireless networks. Proc. IEEE 2016, 103, 1125–1158. [Google Scholar] [CrossRef] [Green Version]
  5. Junhai, L.; Danxia, Y.; Liu, X.; Mingyu, F. A survey of multicast routing protocols for mobile ad-hoc networks. IEEE Commun. Surv. Tutor. 2009, 11, 78–91. [Google Scholar] [CrossRef]
  6. Abusalah, L.; Khokhar, A.; Guizani, M. A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutor. 2008, 10, 78–93. [Google Scholar] [CrossRef]
  7. Kannhavong, B.; Nakayama, H.; Nemoto, Y.; Kato, N.; Jamalipour, A. A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. Commun. 2007, 14, 85–91. [Google Scholar] [CrossRef]
  8. Tomic, I.; McCann, J.A. A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 2017, 4, 1910–1923. [Google Scholar] [CrossRef]
  9. Serpanos, D. The Cyber-Physical Systems Revolution. Computer 2018, 51, 70–73. [Google Scholar] [CrossRef]
  10. Gu, Q.; Formby, D.; Ji, S.; Cam, H.; Beyah, R. Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Secur. Priv. 2018, 16, 49–59. [Google Scholar] [CrossRef]
  11. Olakanmi, O.O.; Pamela, A.; Ashraf, A. A review on secure routing protocols for wireless sensor networks. Int. J. Sens. Wirel. Commun. Control 2017, 7, 79–92. [Google Scholar] [CrossRef]
  12. Mahmoud, M.M.; Lin, X.; Shen, X. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1140–1153. [Google Scholar] [CrossRef]
  13. Kumar, S.; Dutta, K. Security issues in mobile ad hoc networks: A survey. In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications; IGI Global: Hershey, PA, USA, 2014; pp. 176–221. [Google Scholar]
  14. Nadeem, A.; Howarth, M.P. A Survey of MANET Intrusion Detection and Prevention Approaches for Network Layer Attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2027–2045. [Google Scholar] [CrossRef] [Green Version]
  15. Zuniga-Mejia, J.; Villalpando-Hernandez, R.; Vargas-Rosales, C.; Spanias, A. A linear systems perspective on intrusion detection for routing in reconfigurable wireless networks. IEEE Access 2019, 7, 2484–2556. [Google Scholar] [CrossRef]
  16. Zuniga-Mejia, J.; Villapando-Hernandez, R.; Vargas-Rosales, C. On the Robustness of Root Locus based Routing Attack-Detection in Reconfigurable Wireless Networks. In Proceedings of the 16th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN ’19), Miami Beach, FL, USA, 25–29 November 2019. [Google Scholar]
  17. Kolias, C.; Kambourakis, G.; Maragoudakis, M. Swarm intelligence in intrusion detection: A survey. Comput. Secur. 2011, 30, 625–642. [Google Scholar] [CrossRef]
  18. Kolias, C.; Kolias, V.; Kambourakis, G. TermID: A distributed swarm intelligence-based approach for wireless intrusion detection. Int. J. Inf. Secur. 2017, 16, 401–416. [Google Scholar] [CrossRef]
  19. Indirani, G.; Selvakumar, K. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (manet). Int. J. Parallel Emergent Distrib. Syst. 2014, 9, 90–103. [Google Scholar] [CrossRef]
  20. Kumar, G.V.P.; Reddy, D.K. An Agent Based Intrusion Detection System for Wireless Network with Artificial Immune System (AIS) and Negative Clone Selection. In Proceedings of the 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies, Nagpur, India, 9–11 January 2014; pp. 429–433. [Google Scholar]
  21. Shamshirband, S.; Anuar, N.B.; Kiah, M.L.M.; Rohani, V.A.; Petković, D.; Misra, S.; Khan, A.N. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 2014, 42, 102–117. [Google Scholar] [CrossRef]
  22. Bao, F.; Chen, I.; Chang, M.; Cho, J. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 2012, 9, 169–183. [Google Scholar] [CrossRef]
  23. Kumar, N.; Chilamkurti, N. Collaborative trust aware intelligent intrusion detection in VANETs. Comput. Electr. Eng. 2014, 40, 1981–1996. [Google Scholar] [CrossRef]
  24. Xianji, J.; Jianquan, L.; Weiming, T.; Lei, L.; Zhongwei, L. Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng. 2017, 9, 262–273. [Google Scholar]
  25. Desilva, S.; Boppana, R.V. Mitigating malicious control packet floods in ad hoc networks. In Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 13–17 March 2005. [Google Scholar]
  26. Qian, L.; Song, N.; Li, X. Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. J. Netw. Comput. Appl. 2007, 30, 308–330. [Google Scholar] [CrossRef]
  27. Kurosawa, S.; Nakayama, H.; Kato, N.; Jamalipour, A.; Nemoto, Y. Detecting blackhole attack on AODV based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur. 2007, 5, 338–346. [Google Scholar]
  28. Agarwal, P.; Yadav, B.S.; Chandra, J. Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks. In Proceedings of the 16th IEEE International Conference on Networks, New Delhi, India, 12–14 December 2008; Volume 1, pp. 1–6. [Google Scholar]
  29. Nadeem, A.; Howarth, M.P. An intrusion detection and adaptive response mechanism for MANETs. Ad Hoc Netw. 2014, 13, 368–380. [Google Scholar] [CrossRef] [Green Version]
  30. Mitrokotsa, A.; Mavropodi, R.; Douligeris, C. Intrusion detection of packet dropping attacks in mobile ad hoc networks. In Proceedings of the International Conference on Intelligent Systems and Computing: Theory And Applications, Ayia Napa, Cyprus, 6–7 July 2006; pp. 111–116. [Google Scholar]
  31. Shao, M.H.; Lin, J.B.; Lee, Y.P. Cluster-based cooperative back propagation network approach for intrusion detection in MANET. In Proceedings of the 10th IEEE International Conference on Computer and Information Technology, Bradford, UK, 29 June–1 July 2010; pp. 1627–1632. [Google Scholar]
  32. Ganapathy, S.; Yogesh, P.; Kannan, A. Intelligent agent-based intrusion detection system using enhanced multiclass SVM. Comput. Intell. Neurosci. 2012, 2012, 850259. [Google Scholar] [CrossRef] [Green Version]
  33. Shams, E.; Rizaner, A. A novel support vector machine based intrusion detection system for mobile ad hoc networks. Wirel. Netw. 2018, 24, 1821–1829. [Google Scholar] [CrossRef]
  34. Charles, J.F.; Lee, B.; Das, A.; Seet, B. Cross-layer detection of sinking behavior in wireless Ad Hoc networks using SVM and FDA. IEEE Trans. Dependable Secur. Comput. 2011, 8, 233–245. [Google Scholar] [CrossRef]
Figure 1. (a) RWN topology at a given instant τ 1 . (b) Example of a selective forwarding attack.
Figure 1. (a) RWN topology at a given instant τ 1 . (b) Example of a selective forwarding attack.
Electronics 10 03053 g001
Figure 2. (a) Root locus-based misuse detection. (b) LC-IDS anomaly and misuse-detection architecture.
Figure 2. (a) Root locus-based misuse detection. (b) LC-IDS anomaly and misuse-detection architecture.
Electronics 10 03053 g002
Figure 3. ‘Attack-constellation’, representing the system poles at a given instant τ . Each pole in the constellation is sensitive to a specific attack, ω g Ω A . The further the poles from the origin, the greater the value of the probability of a given routing attack ω g .
Figure 3. ‘Attack-constellation’, representing the system poles at a given instant τ . Each pole in the constellation is sensitive to a specific attack, ω g Ω A . The further the poles from the origin, the greater the value of the probability of a given routing attack ω g .
Electronics 10 03053 g003
Figure 4. (a) Example of the reference vector Φ , and several instances of ϕ . (b) Empirical cdf and anomaly decision threshold t h Φ .
Figure 4. (a) Example of the reference vector Φ , and several instances of ϕ . (b) Empirical cdf and anomaly decision threshold t h Φ .
Electronics 10 03053 g004
Figure 5. Training and online detection stages of L C I D S i j , during the training stage we obtain the state-space (SS) model and the respective optimal parameters and the optimal parameters r g , η g , t h g , t h Φ , Φ that minimize the classification error probability. For online detection we obtain and compare the instantaneous system poles to the optimal threshold value, t h g , to detect each routing attack; and we use the reference vector Φ , and the threshold t h Φ , to detect anomalies.
Figure 5. Training and online detection stages of L C I D S i j , during the training stage we obtain the state-space (SS) model and the respective optimal parameters and the optimal parameters r g , η g , t h g , t h Φ , Φ that minimize the classification error probability. For online detection we obtain and compare the instantaneous system poles to the optimal threshold value, t h g , to detect each routing attack; and we use the reference vector Φ , and the threshold t h Φ , to detect anomalies.
Electronics 10 03053 g005
Table 1. Summary of concepts and notation.
Table 1. Summary of concepts and notation.
NotationDescription
G τ Network topology graph at instant τ
V τ Set of nodes at instant τ
v i i-th node
L τ Set of links at instant τ
l i j Link that goes from the i-th node to the j-th node
N i Set of neighboring nodes of the i-th node
Ω A Set of known routing attacks
ω g g-th known routing attack
ψ g Attack severity metric of the g - th routing attack
P g Set of local performance metrics degraded by ω g
π a a-th performance metric
X A Set of local metrics related to ω g
χ A b a-th local metric related to ω g
X N Set of local metrics not related to ω g
χ N c c-th local metric not related to ω g
a ( z ) Polynomial in the Z -plane
a ( k ) Time series
aScalar
a Vector/matrix
a Transpose operator
a 1 Inverse operator
| a | Modulus operator
| | a | | 2 Euclidean norm operator
Table 2. Simulation parameters.
Table 2. Simulation parameters.
Simulation ParameterParameter Value
Type of RWNAd hoc/Mobile ad hoc
Scenario dimensions80 × 80 m.
Total duration20 s.
Simulation period, T0.05 s.
Number of nodes65/{65, 75, 85}
Mobility modelStatic/Random Waypoint
Node speed0/{2, 3, 4, 5} m/s.
Number of attackers1
Attack severity, ψ g { 0 , 0.1 } / { 0 , 0.1 , 0.3 , 0.5 , 0.7 }
Node tx range15 m.
Floor noise−27 dBm
ModulationQPSK
MAC protocolCSMA/CA
Routing protocolAODV
Transport protocolUDP
Traffic modelCBR
{RREQ Flooding,
Type of attackSelective Forwarding,
Worm Hole, Black Hole}
Table 3. Input and output signals used for each L C I D S i j model.
Table 3. Input and output signals used for each L C I D S i j model.
RREQFSFBHWH
π a ( k ) received
header bits
received bits
per link
routing
frequency
of link
routing
frequency
of link
χ N c ( k )
χ A b ( k ) total
received
bits
bits sent
per link
received
packets
received
packets
Table 4. Results for the number of nodes in the experiment. D A g , F P g , and F N g are given as a percentage.
Table 4. Results for the number of nodes in the experiment. D A g , F P g , and F N g are given as a percentage.
Nodes ω 1 ω 2 ω 3 ω 4
r g 0.10.30.10.1
η g 1.21.90.22.1
D A g >99.999>99.999>99.999>99.999
F P g <0.001<0.001<0.001<0.001
65 F N g <0.001<0.001<0.001<0.001
t h g 0.05240.09300.03220.0605
D A Φ 79.496>99.999>99.999>99.999
F P Φ 0.001<0.001<0.001<0.001
F N Φ 20.503<0.001<0.001<0.001
t h Φ 0.01730.00800.11900.0075
r g 0.10.60.10.1
η g 2.3350.22.5
D A g 99.440>99.999>99.999>99.999
F P g 0.137<0.001<0.001<0.001
75 F N g 0.423<0.001<0.001<0.001
t h g 0.05180.47950.07350.0936
D A Φ >99.999>99.99989.85999.960
F P Φ <0.001<0.0010.001<0.001
F N Φ <0.001<0.00110.1400.039
t h Φ 0.00470.00360.00690.0073
r g 0.12.70.10.1
η g 3.87.40.134.8
D A g 99.97497.346>99.999>99.999
F P g 0.0032.302<0.001<0.001
85 F N g 0.0230.352<0.001<0.001
t h g 0.05160.06450.04850.1
D A Φ >99.99950.001>99.99994.990
F P Φ <0.001<0.001<0.0010.001
F N Φ <0.00149.998<0.0015.009
t h Φ 0.40320.02460.00260.0066
Table 5. Results for the number of nodes in the experiment (Attacker at the edge of scenario, indicated by *). D A g , F P g , and F N g are given as a percentage.
Table 5. Results for the number of nodes in the experiment (Attacker at the edge of scenario, indicated by *). D A g , F P g , and F N g are given as a percentage.
Nodes ω 1 ω 2 ω 3 ω 4
r g 0.50.120.70.1
η g 7.60.31.54.9
D A g 97.24294.653>99.999>99.999
F P g 0.9662.811<0.001<0.001
65 * F N g 1.7922.536<0.001<0.001
t h g 0.06370.05270.03910.0948
D A Φ 84.33550.493>99.999>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ 15.66449.506<0.001<0.001
t h Φ 0.00360.03110.01100.0033
r g 0.10.10.10.1
η g 1.10.60.223.7
D A g >99.99999.955>99.999>99.999
F P g <0.0010.023<0.001<0.001
75 * F N g <0.0010.022<0.001<0.001
t h g 0.05440.03910.03480.0073
D A Φ >99.999>99.999>99.99950.237
F P Φ <0.001<0.001<0.001<0.001
F N Φ <0.001<0.001<0.00149.762
t h Φ 0.07600.00340.00810.0184
r g 16.30.19.50.6
η g 359.31.335
D A g 85.00699.969>99.999>99.999
F P g 0.6540.028<0.001<0.001
85 * F N g 14.3400.003<0.001<0.001
t h g 0.00270.10050.00830.600
D A Φ 80.667>99.999>99.999>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ 19.332<0.001<0.001<0.001
t h Φ 0.04726.03190.00130.0074
Table 6. Results for the attack severity ( ψ g ) experiment. D A g , F P g , and F N g are given as a percentage.
Table 6. Results for the attack severity ( ψ g ) experiment. D A g , F P g , and F N g are given as a percentage.
ψ g ω 1 ω 2 ω 3 ω 4
r g 0.70.112.90.1
η g 4.2354.22.1
D A g >99.999>99.99999.930>99.999
F P g <0.001<0.0010.024<0.001
10 F N g <0.001<0.0010.046<0.001
t h g 0.10840.1056 3.6 × 10 9 0.0605
D A Φ 77.641>99.99999.947>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ 22.328<0.0010.052<0.001
t h Φ 0.01790.00670.03760.0156
r g 0.70.10.10.1
η g 3.8350.10.1
D A g >99.999>99.999>99.99988.162
F P g <0.001<0.001<0.0010.370
30 F N g <0.001<0.001<0.00111.468
t h g 0.14920.10560.04980.0716
D A Φ 50.00199.85884.613>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ 49.9990.14115.386<0.001
t h Φ 0.08740.00590.02650.0069
r g 0.60.50.10.1
η g 2.71.60.19.4
D A g >99.999>99.999>99.999>99.999
F P g <0.001<0.001<0.001<0.001
50 F N g <0.001<0.001<0.001<0.001
t h g 0.14260.13160.04910.100
D A Φ 50.91599.858>99.999>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ 49.0840.141<0.001<0.001
t h Φ 0.08160.01050.0120.0024
r g 0.10.19.50.1
η g 3.514.131.511
D A g >99.999>99.99988.990>99.999
F P g <0.001<0.0010.178<0.001
70 F N g <0.001<0.00110.832<0.001
t h g 0.03050.1049 6 × 10 67 0.1
D A Φ 97.90099.983>99.99999.08
F P Φ <0.001<0.001<0.001<0.001
F N Φ 1.9990.016<0.0010.917
t h Φ 0.00020.01010.00640.06469
Table 7. Results for the mobility experiment. D A g , F P g , and F N g are given as a percentage. The first column represents the maximum node speed in (m/s).
Table 7. Results for the mobility experiment. D A g , F P g , and F N g are given as a percentage. The first column represents the maximum node speed in (m/s).
(m/s) ω 1 ω 2 ω 3 ω 4
r g 0.121.70.10.3
η g 2.14.10.135
D A g 93.92390.746>99.999>99.999
F P g 5.1280.349<0.001<0.001
2 F N g 0.9499.254<0.001<0.001
t h g 0.03610.02340.05050.300
D A Φ 99.58053.557>99.999>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ 0.41946.442<0.001<0.001
t h Φ 0.06690.24040.03560.3388
r g 0.10.10.10.1
η g 2.21.30.13.8
D A g 98.54099.94798.433>99.999
F P g 0.2850.0160.431<0.001
3 F N g 1.1750.0371.136<0.001
t h g 0.0510.03450.04910.0914
D A Φ >99.99950.28799.477>99.999
F P Φ <0.001<0.001<0.001<0.001
F N Φ <0.00149.7120.522<0.001
t h Φ 0.01670.48560.02790.0026
r g 0.70.10.10.1
η g 6.91.50.10.8
D A g 99.500>99.99986.94680.539
F P g 0.257<0.00111.46517.993
4 F N g 0.243<0.0011.5891.468
t h g 0.08600.03240.04830.065
D A Φ >99.99998.79150.08299.851
F P Φ <0.001<0.001<0.001<0.001
F N Φ <0.0011.20849.9170.148
t h Φ 0.00460.01470.11830.0459
r g 0.30.10.52.9
η g 5.61.40.416.2
D A g 99.38185.82099.868>99.999
F P g 0.1971.1220.049<0.001
5 F N g 0.4223.0580.083<0.001
t h g 0.06160.01190.05550.1901
D A Φ 50.001>99.999>99.99999.973
F P Φ <0.001<0.001<0.001<0.001
F N Φ 49.998<0.001<0.0010.026
t h Φ 2.16462.13420.02870.0131
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zuniga-Mejia, J.; Villalpando-Hernandez, R.; Vargas-Rosales, C.; Zareei, M. LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless Networks. Electronics 2021, 10, 3053. https://doi.org/10.3390/electronics10243053

AMA Style

Zuniga-Mejia J, Villalpando-Hernandez R, Vargas-Rosales C, Zareei M. LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless Networks. Electronics. 2021; 10(24):3053. https://doi.org/10.3390/electronics10243053

Chicago/Turabian Style

Zuniga-Mejia, Jaime, Rafaela Villalpando-Hernandez, Cesar Vargas-Rosales, and Mahdi Zareei. 2021. "LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless Networks" Electronics 10, no. 24: 3053. https://doi.org/10.3390/electronics10243053

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop