A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET

Full Text (PDF, 742KB), PP.64-71

Views: 0 Downloads: 0

Author(s)

Sherin Zafar 1,* M.K Soni 1

1. Faculty of Engineering, Manav Rachna International University Faridabad, Haryana, 121004, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.12.08

Received: 11 Feb. 2014 / Revised: 7 Jun. 2014 / Accepted: 11 Aug. 2014 / Published: 8 Nov. 2014

Index Terms

MANET, crypto-metric technique, pattern resemblance, hamming distance, correlation coefficient, Hough transform

Abstract

Mobile ad-hoc networks are networks that have properties of self configuration and multi hopping. These networks do not have any fixed infrastructure and need to be dynamic in nature. The specification of dynamism leads to various security breaches that a MANET suffers from such as impersonation, data modification etc. which results in degradation of performance and hence QOS is strongly affected. Hence this paper focuses on improving security performance of MANET by employing biometric technique in combination with cryptography, since biometric perception is specified as the most neoteric technological advancement which enhance security specifications of various networks by specifying exclusive human identification features. Cryptography is designed on computational hardness assumptions making various algorithms hard to break by an adversary. Simulation and experimental results specify that the proposed crypto-metric perception technique leads in achieving better QOS parameters by avoiding security intrusions hence better performance of mobile ad-hoc networks.

Cite This Paper

Sherin Zafar, M K Soni, "A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.12, pp.64-71, 2014. DOI:10.5815/ijcnis.2014.12.08

Reference

[1]Sherin Zafar, M.K Soni,"Secure Routing In MANET through Crypt-Biometric Technique ", IEEE FICTA Conference, 2014.
[2]E.Wolff "Anatomy of the Eye and Orbit":7th edition .H.K Lewis Co.Ltd.
[3]P. Khaw, "Iris Recognition Technology for Improved Authentication", SANS Security Essentials(GSEC)Practical Assignment, version 1.3,SANS institute, pp 5-8,2002.
[4]L. Masek, "Recognition of Human Eye Iris Patterns for Biometric Identification", University of west California, 2003.
[5]Biometric Data Interchange Formats-Part 6"Iris Image Data Safety of Laser Products -Part-I "Equipment Classification and User's Guide, IEC 60582-1, 2001.
[6]S.Lim, K.Lee, O.Byeon, and T.Kim, "Efficient Iris Recognition through Improvement of Feature Vector and Classifier ", ETRI Journal Volume 23.No.2, 2001.
[7]J.Daugmann, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence", IEEE Trans 1 on Pattern Analysis and Machine Intelligence, Vol.15, issue11, 1993.
[8]J. Daugman.,"Biometrics: Personal Identification in Networked Society" .Kluwer Academic Publishers, 1999.
[9]J. Daugman. Iris recognition. American Scientist, 89:326–333, 2001.
[10]J. Daugman, "How iris recognition works", IEEE Transactions on Circuits and Systems for Video Technology (CSVT), 14(1):21–30, 2004.
[11]J. Daugman, "Probing the uniqueness and randomness of iris codes: Results from 200 billion iris pair comparisons", Proceedings of the IEEE, 94:1927–1935: Nov, 2006.
[12]R. P. Wildes. Iris recognition: An emerging biometric technology, Proceedings of the IEEE, 85(9):1348–1363, 1997.
[13]R. P. Wildes, a. J. C. Asmuth, C. Hsu, R. J. Kolczynski, J. R. Matey, and S. E. McBride ,"Automated, Non invasive iris recognition system and method" U.S. Patent,(5,572,596) , 1996.
[14]A. Graps, “An Introduction to Wavelets”, IEEE Computational Science and Engineering, Summer: 1995.
[15]M. Misiti, Y. Misiti, G. Oppenheim, and J Poggi, Wavelet Toolbox 4 User’s Guide ,1997-2009.
[16]J. Daugman, “How Iris Recognition Works”, IEEE Proc. on Image Processing, 2002, doi: 10.1109/ICIP, 1037952, pp.33-36:2002.
[17]Sherin Zafar, M.K Soni,"Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic genetic Algorithm", I.J. Modern Education and Computer Science, 2014, 9, 28-35 Published Online September 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.09.05.
[18]Sherin Zafar, M.K Soni,"Trust Based QOS Protocol(TBQP) using Meta-heuristic Genetic Algorithm for Optimizing and Securing MANET", IEEE International Conference On Reliability, Optimization & Information Technology (ICROIT), pp173-177,2014.