IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 3    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 3,March 2012
High Security for Manet Using Authentication and Intrusion Detection with Data Fusion
Full Text(PDF, )  PP.12-15  
K.K.Lakshmi Narayanan, A.Fidal Castro
Authentication, biometrics, intrusion detection, mobile ad hoc networks (MANETs), security
In Mobile Ad Hoc Network (MANET), Multimodal Biometric technology plays a vital role in giving security between user-to-device authentications. This paper concentrates on the Intrusion Detection and authentication with data fusion in MANET. To overcome the fault in unimodal biometric systems, Multimodal biometrics is set out to work with Intrusion Detection Systems. Each and every device has dimensions and estimation limitations, many devices to be selected and with the help of Dempster-Shafter theory for data fusion observation precision gets increased. Based on the security posture, system concludes which biosensor (IDS) to select and whether user authentication (or IDS input) is essential. By every authentication device and Intrusion Detection System (IDS), the decisions are made in a fully distributed manner. Simulation results are presented to show the effectiveness of the proposed scheme.
[1] J. Liu, F. Yu, C. H. Lung, and H. Tang, “Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 806–815, Feb. 2009.

[2] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous verification using multimodal biometrics,” IEEE Trans. Pattern Anal. Mach. Intell.,vol. 29, no. 4, pp. 687–700, Apr. 2007.

[3] Y. Zhao, W. Liu, W. Lou, and Y. Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 386– 399, Oct.–Dec. 2006.

[4] T. M. Chen and V. Venkataramanan, “Dempster-Shafer theory for intrusion detection in ad hoc networks,” IEEE Internet Comput., vol. 9, no. 6, pp. 35–41, Nov. 2005.

[5] A. Mishra, K. Nadkarni, and V. T. A. Patcha, “Intrusion detection in wireless ad-hoc networks,” IEEE Wireless Commun., vol. 11, no. 1, pp. 48–60, Feb. 2004.

Untitled Page