Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks

被引:41
作者
Bu, Shengrong [1 ]
Yu, F. Richard [1 ]
Liu, Xiaoping P. [1 ]
Mason, Peter [2 ]
Tang, Helen [2 ]
机构
[1] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
[2] Def Res & Dev Canada, Ottawa, ON K1A 0Z4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Authentication; biometrics; intrusion detection; mobile ad hoc networks (MANETs); security; BANDITS; MODEL;
D O I
10.1109/TVT.2010.2103098
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each device in the network has measurement and estimation limitations, more than one device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether user authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.
引用
收藏
页码:1025 / 1036
页数:12
相关论文
共 26 条
  • [1] [Anonymous], THESIS BROWN U PROVI
  • [2] [Anonymous], P 3 INT C DIG INF MA
  • [3] [Anonymous], 2003, P 2003 WORKSH MULT U
  • [4] [Anonymous], 1989, Multi-armed Bandit Allocation Indices
  • [5] Dempster-Shafer theory for intrusion detection in ad hoc networks
    Chen, TM
    Venkataramanan, V
    [J]. IEEE INTERNET COMPUTING, 2005, 9 (06) : 35 - 41
  • [6] DAS SK, 2004, WIRELESS COMMUNICATI, P531
  • [7] MIMO transmission control in fading channels - A constrained Markov decision process formulation with monotone randomized policies
    Djonin, Dejan V.
    Krishnarnurthy, Vikram
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (10) : 5069 - 5083
  • [8] Hu P, 2007, C IND ELECT APPL, P2253
  • [9] Biometric template security
    Jain, Anil K.
    Nandakumar, Karthik
    Nagar, Abhishek
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008,
  • [10] Katar C, 2006, INT J COMPUT SCI NET, V6, P208