%0 Conference Proceedings %T Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks %+ Environnement de Réseaux Autonomes (ERA) %+ Laboratoire Traitement et Communication de l'Information (LTCI) %A Dromard, Juliette %A Khatoun, Rida %A Khoukhi, Lyes %Z Part 1: Emerging Infrastructures for Networks and Services %< avec comité de lecture %( Lecture Notes in Computer Science %B 8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) %C Brno, Czech Republic %Y Anna Sperotto %Y Guillaume Doyen %Y Steven Latré %Y Marinos Charalambides %Y Burkhard Stiller %I Springer %3 Monitoring and Securing Virtualized Networks and Services %V LNCS-8508 %P 29-41 %8 2014-06-30 %D 2014 %R 10.1007/978-3-662-43862-6_3 %K Wireless mesh networks %K reputation computation %K intrusion detection system %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Wireless mesh networks (WMNs) are very attractive networks as they are low cost and able to extend Internet rapidly in areas where other networks (e.g., Wi-Fi, MANETs, wired networks, 3G) cannot access due to their technical and/or economical limitations. However, these networks have to deal with security issues which prevent their deployment. In this paper, we propose a new reputation scheme which aims at preventing nodes from falsely detecting their neighbors as misbehaving due to packet loss over their links. The proposed reputation scheme is based on the fact that a link’s packet loss ratio, when it is computed over a large quantity of observations, is quite stable over time. To detect misbehaving neighbors, a node, via its IDS, compares with the statistical method CUSUM (cumulative sum control chart) whether the distribution of packet loss rate observed for each of its neighbors follows the expected distribution or not. The validation of our solution shows that it allows to assign to nodes a trust value which reflects their real behavior. %G English %Z TC 6 %Z WG 6.6 %2 https://inria.hal.science/hal-01401284/document %2 https://inria.hal.science/hal-01401284/file/978-3-662-43862-6_3_Chapter.pdf %L hal-01401284 %U https://inria.hal.science/hal-01401284 %~ INSTITUT-TELECOM %~ CNRS %~ UNIV-TROYES %~ TELECOM-PARISTECH %~ PARISTECH %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-AIMS %~ IFIP-WG6-6 %~ IFIP-LNCS-8508 %~ LTCI %~ UTT %~ INSTITUTS-TELECOM %~ UTT-LIST3N %~ UTT-GESTION %~ UTT-FULL-TEXT %~ ERA-UTT %~ LIST3N-RECY