4.7 Article

Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks

Journal

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 10, Issue 9, Pages 3064-3073

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2011.071411.102123

Keywords

Authentication; intrusion detection; mobile ad-hoc networks; security

Funding

  1. Natural Science and Engineering Research Council of Canada
  2. Information Technology Enhancements (hSITE) Strategic Research Network

Ask authors/readers for more resources

Continuous user authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints in MANETs. To obtain the optimal scheme of combining continuous user authentication and IDSs in a distributed manner, we formulate the problem as a partially observable Markov decision process (POMDP) multi-armed bandit problem. We present a structural results method to solve the problem for a large network with a variety of nodes. The policies derived from structural results are easy to implement in practical MANETs. Simulation results are presented to show the effectiveness and the performance of the proposed scheme.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available