Sustaining Security in Manet through Biometric Technique Inculcating Meta-heuristic Algorithm Sherin Zafar, Dr.m.k Soni

نویسنده

  • DR. M. K SONI
چکیده

The paper comprehends an impending accost of intensifying biometric stationed authentication technique bestowing meta-heuristic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET as they are advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using meta-heuristic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our this technique is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and hence make the network more secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimized Secure Protocol for MANET through Biometric Approach

This research work undertaken comprehends an impending accost of developing a secure protocol to sustain optimization and trust in MANET through crypt-biometric approach inculcating meta-heuristic algorithm. Meta-heuristics based genetic algorithm not only will help in maintaining Quality of Service(QOS) by selecting a fittest i.e. shortest route but also tends to overcome the security and priv...

متن کامل

Enhancing Security of Networks Through a Novel Biometric Signature Based Approach

This paper focuses on a biometric signature based system as a novel tool for enhancing security in networks. The novel authentication approach takes into consideration a standardized database for analysis. Biometric perception is considered to be the most neoteric technology for sustaining security in various systems by involving exclusive identification features. The attainment of biometric pe...

متن کامل

A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET

Mobile ad-hoc networks are networks that have properties of self configuration and multi hopping. These networks do not have any fixed infrastructure and need to be dynamic in nature. The specification of dynamism leads to various security breaches that a MANET suffers from such as impersonation, data modification etc. which results in degradation of performance and hence QOS is strongly affect...

متن کامل

A novel hybrid meta-heuristic technique applied to the well-known benchmark optimization problems

In this paper, a hybrid meta-heuristic algorithm, based on imperialistic competition algorithm (ICA), harmony search (HS), and simulated annealing (SA) is presented. The body of the proposed hybrid algorithm is based on ICA. The proposed hybrid algorithm inherits the advantages of the process of harmony creation in HS algorithm to improve the exploitation phase of the ICA algorithm. In addition...

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017