Sustaining Security in Manet through Biometric Technique Inculcating Meta-heuristic Algorithm Sherin Zafar, Dr.m.k Soni
نویسنده
چکیده
The paper comprehends an impending accost of intensifying biometric stationed authentication technique bestowing meta-heuristic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET as they are advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using meta-heuristic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our this technique is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and hence make the network more secure.
منابع مشابه
Optimized Secure Protocol for MANET through Biometric Approach
This research work undertaken comprehends an impending accost of developing a secure protocol to sustain optimization and trust in MANET through crypt-biometric approach inculcating meta-heuristic algorithm. Meta-heuristics based genetic algorithm not only will help in maintaining Quality of Service(QOS) by selecting a fittest i.e. shortest route but also tends to overcome the security and priv...
متن کاملEnhancing Security of Networks Through a Novel Biometric Signature Based Approach
This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric pe...
متن کاملA Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET
Mobile ad-hoc networks are networks that have properties of self configuration and multi hopping. These networks do not have any fixed infrastructure and need to be dynamic in nature. The specification of dynamism leads to various security breaches that a MANET suffers from such as impersonation, data modification etc. which results in degradation of performance and hence QOS is strongly affect...
متن کاملA novel hybrid meta-heuristic technique applied to the well-known benchmark optimization problems
In this paper, a hybrid meta-heuristic algorithm, based on imperialistic competition algorithm (ICA), harmony search (HS), and simulated annealing (SA) is presented. The body of the proposed hybrid algorithm is based on ICA. The proposed hybrid algorithm inherits the advantages of the process of harmony creation in HS algorithm to improve the exploitation phase of the ICA algorithm. In addition...
متن کاملA Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017