Continuous authentication consoles in mobile ad hoc network (MANET)

Security in mobile ad-hoc networks (MANETs) is a key issue to be addressed. There are two separate approaches for security in MANETs viz., continuous authentication and intrusion detection. Previous studies in this regard involved a study of the two classes of issues separately. In this work these two classes of security approaches are integrated and combined into a single console. Continuous authentication acts as the first line of defense while intrusion detection system acts as the second. In this framework, biometric authentication is used for continuous authentication. The intrusion detection system has a detection engine and a response engine. The detection engine detects the malicious intruder and the response engine completely eliminates the above detected intruder from the network. The analysis of the security issues is simulated to produce the necessary results.

[1]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[2]  Matthew Turk,et al.  Continuous Multimodal Authentication Using Dynamic Bayesian Networks , 2006 .

[3]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[4]  Myung Gil Kang,et al.  Secrecy Capacity Scaling by Jamming-Aided Hierarchical Cooperation in Ad Hoc Networks , 2016, IEEE Journal of Selected Topics in Signal Processing.

[5]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[6]  Xiangyun Zhou,et al.  When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Sinem Coleri Ergen,et al.  Distributed Medium Access Control Protocol for Successive Interference Cancellation-Based Wireless Ad Hoc Networks , 2017, IEEE Communications Letters.

[8]  Q. Xiao,et al.  A biometric authentication approach for high security ad-hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[9]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[10]  Anish Arora,et al.  On the Repair Time Scaling Wall for MANETs , 2016, IEEE Communications Letters.

[11]  Sajal K. Das,et al.  A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.

[12]  Lie-Liang Yang,et al.  Cross-Layer Aided Energy-Efficient Routing Design for Ad Hoc Networks , 2015, IEEE Communications Surveys & Tutorials.

[13]  Andreas F. Molisch,et al.  Energy-Efficient Decentralized Cooperative Routing in Wireless Networks , 2009, IEEE Transactions on Automatic Control.

[14]  Hsing-Chung Chen,et al.  TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks , 2017, IEEE Systems Journal.

[15]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[16]  Himanshu Aggarwal,et al.  Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks , 2016, Journal of Communications and Networks.

[17]  J. Singhai,et al.  Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network , 2015, IET Networks.

[18]  Robert H. Deng,et al.  A novel privacy preserving authentication and access control scheme for pervasive computing environments , 2006, IEEE Transactions on Vehicular Technology.

[19]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[20]  Yu Zhang,et al.  AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.

[21]  Asaf Shabtai,et al.  Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.