{"title":"分层结构组体系结构中入侵检测对安全组通信的影响","authors":"Jin-Hee Cho, I. Chen","doi":"10.1109/LCN.2008.4664307","DOIUrl":null,"url":null,"abstract":"We develop a class of adaptive security protocols with designs to allow group communication systems (GCSs) in mobile ad hoc networks (MANETs) to dynamically adjust operational settings to best satisfy application-imposed performance and security requirements, leveraging the inherent tradeoff between security and performance properties of the system. These adaptive security protocols include an intrusion detection protocol for dealing with insider attacks and a scalable region-based hierarchical group key management protocol for dealing with outsider attacks. Our design settings include the time interval over which intrusion detection should be performed, and the regional area size for the region-based hierarchical group key management protocol for group key management. When given a set of parameter values characterizing operational and environmental conditions of a GCS, we identify optimal design settings to be used by the system dynamically to maximize the mean time to security failure of the system while minimizing the total group communication cost incurred for GCSs in MANET environments.","PeriodicalId":218005,"journal":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Effect of intrusion detection on secure group communications in hierarchically structured group architectures\",\"authors\":\"Jin-Hee Cho, I. Chen\",\"doi\":\"10.1109/LCN.2008.4664307\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We develop a class of adaptive security protocols with designs to allow group communication systems (GCSs) in mobile ad hoc networks (MANETs) to dynamically adjust operational settings to best satisfy application-imposed performance and security requirements, leveraging the inherent tradeoff between security and performance properties of the system. These adaptive security protocols include an intrusion detection protocol for dealing with insider attacks and a scalable region-based hierarchical group key management protocol for dealing with outsider attacks. Our design settings include the time interval over which intrusion detection should be performed, and the regional area size for the region-based hierarchical group key management protocol for group key management. When given a set of parameter values characterizing operational and environmental conditions of a GCS, we identify optimal design settings to be used by the system dynamically to maximize the mean time to security failure of the system while minimizing the total group communication cost incurred for GCSs in MANET environments.\",\"PeriodicalId\":218005,\"journal\":{\"name\":\"2008 33rd IEEE Conference on Local Computer Networks (LCN)\",\"volume\":\"111 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 33rd IEEE Conference on Local Computer Networks (LCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2008.4664307\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 33rd IEEE Conference on Local Computer Networks (LCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2008.4664307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Effect of intrusion detection on secure group communications in hierarchically structured group architectures
We develop a class of adaptive security protocols with designs to allow group communication systems (GCSs) in mobile ad hoc networks (MANETs) to dynamically adjust operational settings to best satisfy application-imposed performance and security requirements, leveraging the inherent tradeoff between security and performance properties of the system. These adaptive security protocols include an intrusion detection protocol for dealing with insider attacks and a scalable region-based hierarchical group key management protocol for dealing with outsider attacks. Our design settings include the time interval over which intrusion detection should be performed, and the regional area size for the region-based hierarchical group key management protocol for group key management. When given a set of parameter values characterizing operational and environmental conditions of a GCS, we identify optimal design settings to be used by the system dynamically to maximize the mean time to security failure of the system while minimizing the total group communication cost incurred for GCSs in MANET environments.