Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks

Bu, S. , Yu, F. R., Liu, X. P. and Tang, H. (2011) Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Transactions on Wireless Communications, 10(9), pp. 3064-3073. (doi: 10.1109/TWC.2011.071411.102123)

Full text not currently available from Enlighten.

Abstract

Continuous user authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints in MANETs. To obtain the optimal scheme of combining continuous user authentication and IDSs in a distributed manner, we formulate the problem as a partially observable Markov decision process (POMDP) multi-armed bandit problem. We present a structural results method to solve the problem for a large network with a variety of nodes. The policies derived from structural results are easy to implement in practical MANETs. Simulation results are presented to show the effectiveness and the performance of the proposed scheme.

Item Type:Articles
Status:Published
Refereed:Yes
Glasgow Author(s) Enlighten ID:Bu, Dr Shengrong
Authors: Bu, S., Yu, F. R., Liu, X. P., and Tang, H.
College/School:College of Science and Engineering > School of Engineering > Systems Power and Energy
Journal Name:IEEE Transactions on Wireless Communications
Publisher:IEEE
ISSN:1536-1276
ISSN (Online):1558-2248

University Staff: Request a correction | Enlighten Editors: Update this record