IJMECS Vol. 6, No. 9, 8 Sep. 2014
Cover page and Table of Contents: PDF (size: 495KB)
Full Text (PDF, 495KB), PP.28-35
Views: 0 Downloads: 0
Biometrics, genetic algorithm, secure routing protocols in MANET, ICP
The paper comprehends an impending accost of intensifying biometric stationed authentication protocol(BSAP) bestowing meta-heuristic genetic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET. Biometrics are more advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using genetic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our protocol is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and make the network more secure.
Sherin Zafar, M K Soni, "Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm", International Journal of Modern Education and Computer Science (IJMECS), vol.6, no.9, pp.28-35, 2014. DOI:10.5815/ijmecs.2014.09.05
[1]Hao.Y et al., “Security in Mobile Ad-hoc Networks: Challenges and Solutions”, IEEE Wireless Communications, 2004.
[2]Ananda Krishna.B, Radha.S and K Chenna Kesava Reddy, “Data Security in Ad hoc Networks using Randomization of Cryptographic Algorithms”, Journal of Applied Sciences, pp. 4007-4012, 2007.
[3]Tao Wan,Evanglelos Kranakis, P.C. van Oorschot, “Securing the Destination Sequenced Distanve Vector Routing Protocol”.
[4]Hahill.B et al., “Secure Protocol for Ad-hoc Networks”,OEEE CNP,2002.
[5]Fessi B A, Ben Abdullah, S.Hamdi Mand Boudriga, “A new genetic algorithm approach for intrusion response system in computer networks”, IEEE Symposium on Computers and Communications, pp. 342-347, 2009.
[6]Anand Patwardan, Jim Parker, Anupam Joshi, Michaela Iorga and Tom Karygiannis “Secure Routing and Intrusion Detection in Ad-hoc Networks” Third IEEE International Conference on Pervasive computing and Communications, March 2005.
[7]Zarza L., Pegueroles J and Soriano M “Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms.
[8]Abhishek Roy, Sajal K. Das, “QM2RP: A QoS-Based Mobile Multicast Routing Protocol Using Multi-Objective Genetic Algorithm”, Center for Research in Wireless Mobility and Networking (CReWMaN), 2004.
[9]Rajaram.A,S.Palaniswami“A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks”, (IJCSIS) International Journal of Computer Science and Information Security, pp.Vol. 6, No. 1, 2007.
[10]Qinghan Xiao, “A Biometric Authentication Approach for High Security Ad hoc Networks”, Proceedings of IEEE Workshop on Information Assistance, pp. 250-256, 2004.
[11]Jie Liu, F. Richard Yu, Chung-Horng Lung and Helen Tang, “Optimal Biometric-Based Continuous Authentication in Mobile Ad hoc Networks”, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 76-81, 2007.
[12]Shanthini.B and S. Swamynathan “A Cancelable Biometric-Based Security System for Mobile Ad Hoc Networks”, International Conference on Computer Technology (ICONCT 09), pp. 179-184, 2009.