Results 1 -
5 of
5
Optimal Combined Intrusion Detection and Biometric-Based Continuous Authentication in High Security Mobile Ad Hoc Networks
- IEEE Transactions on Wireless Communications
, 2009
"... Abstract—Two complementary classes of approaches exist to protect high security mobile ad hoc networks (MANETs), prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection. Most previous work studies these two classes of issues separately. In thi ..."
Abstract
-
Cited by 15 (1 self)
- Add to MetaCart
Abstract—Two complementary classes of approaches exist to protect high security mobile ad hoc networks (MANETs), prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection. Most previous work studies these two classes of issues separately. In this paper, we propose a framework of combining intrusion detection and continuous authentication in MANETs. In this framework, multimodal biometrics are used for continuous authentication, and intrusion detection is modeled as sensors to detect system security state. We formulate the whole system as a partially observed Markov decision process considering both system security requirements and resource constraints. We then use dynamic programming-based hidden Markov model scheduling algorithms to derive the optimal schemes for both intrusion detection and continuous authentication. Extensive simulations show the effectiveness of the proposed scheme. Index Terms—Security, mobile ad hoc networks, authentica-tion, intrusion detection. I.
International Journal on Recent and Innovation Trends in Computing and Communication Intrusion Detection Systems and Security Aspects for Mobile Ad Hoc Networks __________________________________________________*****
"... Abstract--Mobile ad hoc networks (MANETs) have emerged as a tremendous wireless networking technology. MANETs are scalable and does not require a fixed architecture .nodes of the network plays the dual role as the transmitter and as the receiver. The self configuring ability has made MANETs useful ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract--Mobile ad hoc networks (MANETs) have emerged as a tremendous wireless networking technology. MANETs are scalable and does not require a fixed architecture .nodes of the network plays the dual role as the transmitter and as the receiver. The self configuring ability has made MANETs useful in various applications such as military use and emergency recovery. Within the same communication range nodes communicate with each other directly .otherwise they rely on others for message passing. The open medium and the wide distribution of nodes made MANETs vulnerable to malicious attackers.
2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) SenGuard: Passive User Identification on Smartphones Using Multiple Sensors
"... Abstract—User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identificat ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identification framework that enables continuous and implicit user identification service for smartphone. Different from traditional active user authentication and access control, SenGuard leverages availability of multiple sensors on today’s smartphones and passively use sensor inputs as sources of user authentication. It extracts sensor modality dependent user identification features from captured sensor data and performs user identification at background. SenGuard invokes active user authentication when there is a mounting evidence that the phone user has changed. In addition, SenGuard uses a novel virtualization based system architecture as a safeguard to prevent subversion of the background user identification mechanism by moving it into a privileged virtual domain. An initial prototype of SenGuard was created using four sensor modalities including, voice, location, multitouch, and locomotion. Preliminary empirical studies with a set of users indicate that those four modalities are suited as data sources for implicit mobile user identification. I.
Dynamic Intrusion Detection with Data Fusion and Aggregation in High-Security Mobile Ad Hoc Networks
"... solutions for continuous user to device authentication in highsecurity mobile ad hoc networks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with improved intrusion detection systems ..."
Abstract
- Add to MetaCart
solutions for continuous user to device authentication in highsecurity mobile ad hoc networks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with improved intrusion detection systems (IIDSs) to alleviate the shortcomings of uni-modal biometric systems. Since each device in the network has measurement and estimation limitations, more than one device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster–Shafer theory for data fusion. The system decides whether user authentication (or IIDS input) is required and which biosensors (or IIDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each authentication device and IIDS. Simulation results are presented to show the effectiveness of the proposed scheme.
Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS – A Survey M.Ambika
"... Mobile ad hoc networks (MANET) have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. The mobile nodes are exposed to various kinds of attacks and most of the times the intruders get into network, in order to hold illegal a ..."
Abstract
- Add to MetaCart
(Show Context)
Mobile ad hoc networks (MANET) have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. The mobile nodes are exposed to various kinds of attacks and most of the times the intruders get into network, in order to hold illegal authority over the nodes. Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Intrusion detection is considered as the prevention based approach for securing the MANETs. This paper aims to classify various intrusion detection techniques used in MANETs. Also this paper showcases process of continuous authentication through multimodal biometric technique.