Biometric based Security Solutions for MANET: A Review

Full Text (PDF, 298KB), PP.44-50

Views: 0 Downloads: 0

Author(s)

Ajay Jangra 1,* Shivi Goel 1

1. University Institute of Engineering and Technology, Kurukshetra, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.10.07

Received: 22 Dec. 2012 / Revised: 19 Mar. 2013 / Accepted: 14 May 2013 / Published: 8 Aug. 2013

Index Terms

MANETs, security challenges, biometrics, cryptography, intrusion detection

Abstract

Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in which biometrics with cryptography or intrusion detection has gained a momentum in recent years. This paper critically reviews and investigates the present biometric based security models works for MANETs, and along with security challenges and direction of further research are proposed.

Cite This Paper

Ajay Jangra, Shivi Goel, "Biometric based Security Solutions for MANET: A Review", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.10, pp.44-50, 2013. DOI:10.5815/ijcnis.2013.10.07

Reference

[1]Panagiotis Papadimitratos and Zygmunt J. Haas. “The handbook of Mobile Ad Hoc Networks”,CRC Press, Inc. Boca Raton, FL, USA, 2003.
[2]Pradip M. Jawandhiya, Mangesh M. Ghonge. “A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology, 2010.
[3]K.P. Manikandan, Dr. R .Satyaprasad, Dr. Rajasekhararao. “Analysis and Diminution of Security Attacks on Mobile Ad hoc Network”, IJCA Special Issue on “Mobile Ad-hoc Networks “MANETs, 2010.
[4]Yongguang Zhang and Wenke Lee. “Intrusion Detection in Wireless Ad Hoc Networks” in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom’2000), August 6–11, 2000.
[5]Jie Liu, F. Richard Yu, Chung-Horng Lung and Helen Tang. “Optimal Biometric-Based Continuous Authentication in Mobile Ad hoc Networks” in Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007) .
[6]Jie Liu, F. Richard Yu, Chung-Horng Lung and Helen Tang. “A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks” in IEEE Communications Society, 2008.
[7]Jie Liu, F. Richard Yu, Chung-Horng Lung and Helen Tang. “Optimal Combined Intrusion Detection and Biometric-Based Continuous Authentication in High Security Mobile Ad Hoc Networks” in IEEE transactions on wireless communications, vol. 8, no. 2, February 2009.
[8]Shengrong Bu, F. Richard Yu, Xiaoping P. Liu, Peter Mason, and Helen Tang. “Distributed Combined Authentication and Intrusion Detection with Data Fusion in High-Security Mobile Ad Hoc Networks” in IEEE transactions on vehicular technology, vol. 60, no. 3, March 2011.
[9]Nageshkumar.M, Mahesh.PK and M.N. Shanmukha Swamy. “An Efficient Secure Multimodal Biometric Fusion Using Palm print and Face Image” in IJCSI, International Journal of Computer Science Issues, Vol. 2, 2009.
[10]Hiteishi Diwanji and J.S. Shah. “Enhancing Security in MANET through Unimodal Biometric Encryption Key” in IEEE, December 2011.
[11]Manisha Mehta, Hiteishi Diwanji, Jagdish S Shah. “A Genetic Based Non-Invertible Cryptographic Key Generation from Cancelable Biometric in MANET” in IJCTA, Nov-Dec 2011.
[12]A. Jagadeesan, T. Thillaikkarasi, Dr. K. Duraiswamy. “Cryptographic key generation from multiple biometric modalities: Fusing minutiae with Iris feature” in International Journal of Computer Applications, June 2010.