IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v14y2021i18p5954-d639120.html
   My bibliography  Save this article

On the Suitability of Intrusion Detection System for Wireless Edge Networks

Author

Listed:
  • Vladimir Shakhov

    (Department of Electrical and Computer Engineering, University of Ulsan, Ulsan 44610, Korea)

  • Olga Sokolova

    (Institute of Computational Mathematics and Mathematical Geophysics, 630090 Novosibirsk, Russia)

  • Insoo Koo

    (Department of Electrical and Computer Engineering, University of Ulsan, Ulsan 44610, Korea)

Abstract

Multi-access edge computing has become a strategic concept of the Internet of Things. The edge computing market has reached USD several billion and is growing intensively. In the edge-computing paradigm, most of the data is processed close to, or at the edge of, the network. This greatly reduces the computation and communication load of the network core. Moreover, edge computing provides better support for user privacy. On the other hand, an increase in data processing locations will proportionately increase the attack surface. An edge node can be put out of service easily by being flooded with spoofed packets owing to limited capacities and resources. Furthermore, wireless edge nodes are quite vulnerable to energy exhaustion attacks. In this situation, traditional network security mechanisms cannot be used effectively. Therefore, a tradeoff between security and efficiency is needed. This study considered the requirements under which the use of an intrusion detection system (IDS) is justified. To the best of our knowledge, this is a first attempt to combine IDS quality, system performance degradation due to IDS operations, and workload specificity into a unified quantitative criterion. This paper is an extended version of a report published in the proceedings of the ICCSA 2020 and differs from it in many ways. In particular, this paper considers novel mathematical problems regarding the deployment strategies for an IDS and the corresponding inverse problems and provides closed-form solutions for a few previously unsolved problems.

Suggested Citation

  • Vladimir Shakhov & Olga Sokolova & Insoo Koo, 2021. "On the Suitability of Intrusion Detection System for Wireless Edge Networks," Energies, MDPI, vol. 14(18), pages 1-13, September.
  • Handle: RePEc:gam:jeners:v:14:y:2021:i:18:p:5954-:d:639120
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/14/18/5954/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/14/18/5954/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Mohit Mittal & Rocío Pérez de Prado & Yukiko Kawai & Shinsuke Nakajima & José E. Muñoz-Expósito, 2021. "Machine Learning Techniques for Energy Efficiency and Anomaly Detection in Hybrid Wireless Sensor Networks," Energies, MDPI, vol. 14(11), pages 1-21, May.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mudassir Khan & A. Ilavendhan & C. Nelson Kennedy Babu & Vishal Jain & S. B. Goyal & Chaman Verma & Calin Ovidiu Safirescu & Traian Candin Mihaltan, 2022. "Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN," Energies, MDPI, vol. 15(13), pages 1-14, June.
    2. Wojciech Szczepanik & Marcin Niemiec, 2022. "Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis," Energies, MDPI, vol. 15(11), pages 1-19, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:14:y:2021:i:18:p:5954-:d:639120. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.