High Security for MANET Using Authentication and Intrusion Detection with Data Fusion
Abstract
Keywords
Full Text:
PDFReferences
J. Liu, F. Yu, C. H. Lung, and H. Tang, “Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806–815, Feb. 2009.
T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous verification using multimodal biometrics,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 687–700, Apr. 2007.
Y. Zhao, W. Liu, W. Lou, and Y. Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 386–399, Oct.–Dec. 2006.
T. M. Chen and V. Venkataramanan, “Dempster-Shafer theory for intrusion detection in ad hoc networks,” IEEE Internet Comput., vol. 9, no. 6, pp. 35–41, Nov. 2005.
A. Mishra, K. Nadkarni, and V. T. A. Patcha, “Intrusion detection in wireless ad-hoc networks,” IEEE Wireless Commun., vol. 11, no. 1, pp. 48–60, Feb. 2004.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.