A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks

Two complementary classes of approaches exist to protect high security mobile ad hoc networks (MANETs), prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection. Most previous work studies these two classes of issues separately. In this paper, we propose a framework of combining intrusion detection and continuous authentication in MANETs. In this framework, multimodal biometrics are used for continuous authentication, and intrusion detection is modeled as sensors to detect system security state. We formulate the system and use dynamic programming- based algorithms to derive the optimal schemes for both intrusion detection and continuous authentication. Simulation examples show the effectiveness of the proposed scheme.

[1]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[2]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[3]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[4]  Matthew Turk,et al.  Continuous Multimodal Authentication Using Dynamic Bayesian Networks , 2006 .

[5]  A. Cassandra,et al.  Exact and approximate algorithms for partially observable markov decision processes , 1998 .

[6]  Gregory R. Ganger,et al.  Secure Continuous Biometric-Enhanced Authentication , 2000 .

[7]  H. Bredin,et al.  Multi-modal biometric authentication on the SecurePhone PDA , 2006 .

[8]  Gregory R. Ganger,et al.  Secure Continuous Biometric-Enhanced Authentication (CMU-CS-00-134) , 2000 .

[9]  Vikram Krishnamurthy,et al.  Algorithms for optimal scheduling and management of hidden Markov model sensors , 2002, IEEE Trans. Signal Process..

[10]  William S. Lovejoy,et al.  Computationally Feasible Bounds for Partially Observed Markov Decision Processes , 1991, Oper. Res..

[11]  Sandeep Kumar,et al.  Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[12]  Edward J. Sondik,et al.  The Optimal Control of Partially Observable Markov Processes over a Finite Horizon , 1973, Oper. Res..

[13]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[14]  Q. Xiao,et al.  A biometric authentication approach for high security ad-hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[15]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.