Stretch and Shrink Method for Security in MANET Using Biometric and Intrusion Detection System

Mobile ad hoc is an infrastructure less dynamic network used in many applications; it has been target of various attacks and it makes security problems. The MANET is a collection of autonomous wireless nodes, in which each node changes its geographical position frequently and acts as a router to forward packets. This work aims to provide an enhanced level of security by using the prevention based and detection based approaches such as authentication and intrusion detection. The multi-model biometric technology is used for continuous authentication and intrusion detection in high security cluster based MANET. In this paper, an attempt has been made to combine continuous authentication and intrusion detection. In this scheme, Dempster-Shafer theory is used for data fusion because more than one device needs to be chosen and their observation can be fused to increase observation accuracy. The topology stability and network scalability are playing a significant role in mobile ad hoc to determining the network performance. Hence an attempt has been made to analyze the factors such as nearest neighbor and association rule mining in the ad hoc network’s bench mark algorithms such as LCA2, load balance, adaptive multi-hop algorithm and Basagni’s DCA and DMAC to form a clustered mobile ad hoc network.

[1]  Anthony Ephremides,et al.  A Distributed Algorithm for Organizing Mobile Radio Telecommunication Networks , 1981, IEEE International Conference on Distributed Computing Systems.

[2]  Mario Gerla,et al.  Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.

[3]  Mahesh Motwani,et al.  Survey of clustering algorithms for MANET , 2009, ArXiv.

[4]  S. S. Tyagi Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .

[5]  Ravi Prakash,et al.  Load-balancing clusters in wireless ad hoc networks , 2000, Proceedings 3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology.

[6]  Sufian Yousef,et al.  A Load-Balancing and Weighted Clustering Algorithm in Mobile Ad-Hoc Network , 2009 .

[7]  Yi Xu,et al.  Topology Stability Analysis and Its Application in Hierarchical Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[8]  G. Aguilar,et al.  Multimodal biometric system using fingerprint , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[9]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[10]  Michael P. Howarth,et al.  An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.

[11]  Esmaeil Kheirkhah,et al.  Security challenges in mobile ad hoc networks: a survey , 2015, ArXiv.

[12]  Jalan Sultan Sulaiman,et al.  Modeling and Simulation Of Dynamic Intermediate Nodes And Performance Analysis in MANETS Reactive Routing protocols , 2011 .

[13]  Prerna Malhotra,et al.  A Survey of Weight-Based Clustering Algorithms in MANET , 2013 .

[14]  Mahesh Motwani,et al.  Energy Aware Load Balancing Clustering in Mobile Ad Hoc Networks , 2014 .

[15]  Lina Zhao,et al.  A new algorithm of nodes partition using for Ad Hoc network model , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[16]  ChetnaKaushal,et al.  A Review: Clumping in Mobile AdhocNetworks , 2014 .