Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS – A Survey

Print
PDF
IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
© 2013 by IJCA Journal
ICIIIOES - Number 5
Year of Publication: 2013
Authors:
M. Ambika
R. V. Nataraj

M Ambika and R V Nataraj. Article: Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS – A Survey. IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences ICIIIOES(5):23-26, December 2013. Full text available. BibTeX

@article{key:article,
	author = {M. Ambika and R. V. Nataraj},
	title = {Article: Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS – A Survey},
	journal = {IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences},
	year = {2013},
	volume = {ICIIIOES},
	number = {5},
	pages = {23-26},
	month = {December},
	note = {Full text available}
}

Abstract

Mobile ad hoc networks (MANET) have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. The mobile nodes are exposed to various kinds of attacks and most of the times the intruders get into network, in order to hold illegal authority over the nodes. Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Intrusion detection is considered as the prevention based approach for securing the MANETs. This paper aims to classify various intrusion detection techniques used in MANETs. Also this paper showcases process of continuous authentication through multimodal biometric technique.

References

  • Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong, "A New Routing Attack in Mobile Ad Hoc Networks," International Journal of Information Technology Vol. 11 No. 2.
  • Q. Xiao, "A biometric authentication approach for high security ad-hocnetworks," in Proc. IEEE Info. Assurance Workshop, West Point, NY,June 2004.
  • A. Ross and A. K. Jain, "Multimodal biometrics: an overview," in Proc. 12th European Signal Proc. Conf. , Vienna, Austria, 2004.
  • A. Ross and A. K. Jain, "Information fusion in biometrics," PatternRecognition Lett. , vol. 24, pp. 2115-2225, Sept. 2003.
  • Sim T, Zhang S, R. Janakiraman and S. Kumar, "Continuous verification using multimodal biometrics," IEEE Trans. Pattern Anal. Mach. Intell. 2007; vol. 29, pp. 687-700.
  • Korman J, A C Morris, D Wu and S. A. Jassim, "Multi-modal biometrics authentication on the secure phone PDA," in Proc. 2nd Workshop Multimodal User Authentication, Toulouse, France, May 2006.
  • Altinok A, M Turk, "Temporal integration for continuous multimodal biometrics," in Proc. Workshop Multimodal User Authentication, Santa Barbara, CA, Dec. 2003.
  • Muncaster J, Turk M, "Continuous multimodal authentication using dynamic Bayesian networks," in Proc. 2nd Workshop Multimodal User Authentication, Toulouse, France, May 2006.
  • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wire-less Ad Hoc Networks," IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, February 2004.
  • H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, N. Kato, "A Dynamic Anomaly Detection Scheme for AODVBasedMobile Ad Hoc Networks," IEEE Transactions onVehicular Technology, vol. 58, no. 5, pp. 2471-2481, Jun 2009.
  • C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "AdHoc On-Demand Distance Vector Routing", IETF RFC 3561,July 2003.
  • S. Bu, F. Yu, X. Liu, P. Mason and H. Tang, "Distributedcombined authentication and intrusion detection with data fusionin high-security mobile ad hoc networks," IEEE Transactions onVehicular Technology, vol 60 no. 3 pp. 1025–1036, March 2011.
  • Noman Mohammed Hadi Otrok, Lingyu Wang, MouradDebbabi and Prabir Bhattacharya, "Mechanism Design-BasedSecure Leader Election Model for Intrusion Detection inMANET" IEEE Transactions on dependable and SecureComputing, vol 8, no 1, Jan-Feb 2011.
  • Sevil Sen, John A. Clark "Evolutionary computationtechniques for intrusion detection in mobile ad hoc networks". Computer Networks Vol 55, Issue 15, pp. 3441-3457,211.