Authentication technique to reduce call setup delay incurred due to authentication in mobiles

Wireless Mobile Adhoc network is an infrastructure less network which consists of equally distributed self configuring mobile nodes. Secured access to these mobile nodes is a major issue, since these devices are most widely used in our day to day life due to their diverse capabilities like online transactions processing. Designing a reliable authentication technique for users of these mobile nodes with minimum delay incurred for the authentication process is the most vital and challenging task, so that only legitimate users can access their personal data and also communicate with the other mobile devices in the network. In this paper we present an approach for authentication of the Mobile users with minimum time delay incurred for authentication process, which is well explained with a scenario of setting up a call session during an emergency, unlike traditional techniques and hence reducing the average delay caused due to setting up a call session after authenticating the user. Performance valuation indicate that this approach achieves a reliable security for nodes with a minimum time overhead.

[1]  Wonjun Lee,et al.  Reducing Call Setup Latency in Mobile VoIP Systems , 2011, IEEE Communications Letters.

[2]  Gueesang Lee,et al.  Implicit authentication based on ear shape biometrics using smartphone camera during a call , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[3]  Ioannis A. Kakadiaris,et al.  Mobile User Authentication Using Statistical Touch Dynamics Images , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Rahim Tafazolli,et al.  Reducing the emergency call setup duration in UMTS , 2011, 2011 19thTelecommunications Forum (TELFOR) Proceedings of Papers.

[5]  Steven Furnell,et al.  Surveying the Development of Biometric User Authentication on Mobile Phones , 2015, IEEE Communications Surveys & Tutorials.

[6]  B. Ramesh,et al.  Design of biometric authentication technique for MANET based emergency response system , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[7]  Nasir D. Memon,et al.  Multitouch Gesture-Based Authentication , 2014, IEEE Transactions on Information Forensics and Security.

[8]  Seifedine Kadry,et al.  Design of Secure Mobile Communication using Fingerprint , 2009 .