CFP last date
20 January 2025
Reseach Article

Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to reduce the computation complexity

Published on May 2012 by S. Parasakthi, A. John Sanjeev Kumar
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 1
May 2012
Authors: S. Parasakthi, A. John Sanjeev Kumar
e7f3694c-96ac-4af7-9f7a-061acf730cc0

S. Parasakthi, A. John Sanjeev Kumar . Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to reduce the computation complexity. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 1 (May 2012), 23-27.

@article{
author = { S. Parasakthi, A. John Sanjeev Kumar },
title = { Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to reduce the computation complexity },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 1 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 23-27 },
numpages = 5,
url = { /proceedings/ncacsa/number1/6481-1006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A S. Parasakthi
%A A. John Sanjeev Kumar
%T Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to reduce the computation complexity
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 1
%P 23-27
%D 2012
%I International Journal of Computer Applications
Abstract

Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with Intrusion Detection Systems (IDS) to alleviate the shortcomings of unimodal biometric systems. Since each device in the network has measurement and estimation limitations, more than one device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster–Shafer theory for data fusion. The system decides whether user authentication (or IDS input) is required and which biosensors (or IDS) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme to reduce the Computation.

References
  1. Y. Zhao, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Dependable Secure Comput. , vol. 3, no. 4, pp. 386–399, Oct. –Dec. 2006.
  2. B. Rong, H. -H. Chen, Y. Qian, K. Lu, R. Q. Hu, and S. Guizani, "A pyramidal security model for large-scale group-oriented computing in mobile ad hoc networks: The key management study," IEEE Trans. Veh. Technol. , vol. 58, no. 1, pp. 398–408, Jan. 2009.
  3. T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, "Continuous verification using multimodal biometrics," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 29, no. 4, pp. 687–700, Apr. 2007.
  4. Q. Xiao, "A biometric authentication approach for high security adhoc networks," in Proc. IEEE Inf. Assur. Workshop, West Point, NY, Jun. 2004, pp. 250–256.
  5. J. Koreman, A. C. Morris, D. Wu, and S. A. Jassim, "Multi-modal biometrics authentication on the secure phone PDA," in Proc. 2nd Workshop Multimodal User Authentication, Toulouse, France, May 2006.
  6. S. K. Das, A. Agah, and K. Basu, "Security in wireless mobile and sensor networks," in Wireless Communications Systems and Networks. New York: Plenum, Jan. 2004, pp. 531–557.
  7. A. Altinok and M. Turk, "Temporal integration for continuous multimodal biometrics," in Proc. Workshop Multimodal User Authentication, Santa Barbara, CA, Dec. 2003.
  8. J. Muncaster and M. Turk, "Continuous multimodal authentication using dynamic Bayesian networks," in Proc. 2nd Workshop Multimodal User Authentication, Toulouse, France, May 2006.
  9. J. Liu, F. Yu, C. H. Lung, and H. Tang, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," IEEE Trans. Wireless Commun. , vol. 8, no. 2, pp. 806–815, Feb. 2009.
  10. V. Krishnamurthy and B. Wahlberg, "Partially observed Markov decision process multiarmed bandits—Structural results," Math. Oper. Res. , vol. 34, no. 2, pp. 287–302, May 2009.
  11. H. Wu, "Sensor fusion for context-aware computing using Dempster- Shafer theory," Ph. D. dissertation, Carnegie Mellon Univ. , Pittsburgh, PA, 2003.
  12. A. Papanikolaou, C. Ilioudis, C. Georgiadis, and E. Pimenidis, "The importance of biometric sensor continuous secure monitoring," in Proc. 3rd Int. Conf. Digital Inf. Manage. , London, U. K. , Nov. 2008.
  13. A. Mishra, K. Nadkarni, and V. T. A. Patcha, "Intrusion detection in wireless ad-hoc networks," IEEE Wireless Commun. , vol. 11, no. 1, pp. 48–60, Feb. 2004.
  14. C. Katar, "Combining multiple techniques for intrusion detection," IJCSNS Int. J. Comput. Sci. Netw. Security, vol. 6, no. 2B, pp. 208–218, Feb. 2006.
  15. P. Hu, Z. Zhou, Q. Liu, and F. Li, "The HMM-based modeling for the energy level prediction in wireless sensor networks," in Proc. IEEE Conf. Ind. Electron. Appl. , Harbin, China, May 2007, pp. 2253–2258.
  16. A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process. —Special Issue on Biometrics, vol. 2008, no. 113, pp. 1–17, Jan. 2008.
  17. P. Whittle, "Multi-armed bandits and the Gittins index," J. R. Stat. Soc. Ser. B, vol. 42, no. 2, pp. 143–149, 1980.
  18. J. Gittins, Multi-Armed Bandit Allocation Indices. Hoboken, NJ: Wiley, 1989.
  19. D. Ruta and B. Gabrys, "An overview of classifier fusion methods," Comput. Inf. Syst. , vol. 7, pp. 1–10, 2000.
  20. T. M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks," IEEE Internet Comput. , vol. 9, no. 6, pp. 35–41, Nov. 2005.
  21. Bo Rong, Hsiao-Hwa Chen, Yi Qian , Rose Qingyang Hu and Sghaier Guizani "A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study" IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 1, JANUARY 2009 pp 398-408.
  22. Terence Sim, Member, Sheng Zhang, Rajkumar Janakiraman, and Sandeep Kumar "Continuous Verification Using Multimodal Biometrics" IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 29, NO. 4, APRIL 2007 pp 687-700.
  23. Jie Liu, F. Richard Yu, Chung-Horng Lung, and Helen Tang "Optimal Combined Intrusion Detection and Biometric-Based Continuous Authentication in High Security Mobile Ad Hoc Networks" IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 2, FEBRUARY 2009 pp 806-815.
  24. Yanchao Zhang, Wei Liu, Wenjing Lou and Yuguang Fang "Securing Mobile Ad Hoc Networks with Certificateless Public Key" IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 3, NO. 4, OCTOBER-DECEMBER 2006 pp 386-399.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Biometrics Intrusion Detection Mobile Ad Hoc Networks (manets) Security