By Topic

Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Shengrong Bu ; Dept. of Syst. & Comput. Eng., Carleton Univ., Ottawa, ON, Canada ; Yu, F.R. ; Liu, X.P. ; Tang, H.

Continuous user authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints in MANETs. To obtain the optimal scheme of combining continuous user authentication and IDSs in a distributed manner, we formulate the problem as a partially observable Markov decision process (POMDP) multi-armed bandit problem. We present a structural results method to solve the problem for a large network with a variety of nodes. The policies derived from structural results are easy to implement in practical MANETs. Simulation results are presented to show the effectiveness and the performance of the proposed scheme.

Published in:

Wireless Communications, IEEE Transactions on  (Volume:10 ,  Issue: 9 )