By Topic

A Computationally Efficient Method for Joint Authentication and Intrusion Detection in Mobile Ad-Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Shengrong Bu ; Dept. of Syst. & Comput. Eng., Carleton Univ., Ottawa, ON, Canada ; Yu, F.R. ; Liu, P.X. ; Tang, H.

Continuous authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints in MANETs. To obtain the optimal scheme of combining continuous authentication and IDSs in a distributed manner, we formulate the problem as a partially observable distributed stochastic system. We present structural results for this problem in order to decrease computational complexity, making our solution usable in large networks. The policies derived from structural results are easy to implement in practical MANETs. Simulation results are presented to show the performance of this method for the proposed scheme.

Published in:

Communications (ICC), 2011 IEEE International Conference on

Date of Conference:

5-9 June 2011