Optimized Secure Protocol for MANET through Biometric Approach

نویسنده

  • Sherin Zafar
چکیده

This research work undertaken comprehends an impending accost of developing a secure protocol to sustain optimization and trust in MANET through crypt-biometric approach inculcating meta-heuristic algorithm. Meta-heuristics based genetic algorithm not only will help in maintaining Quality of Service(QOS) by selecting a fittest i.e. shortest route but also tends to overcome the security and privacy concerns that exist in biometric technology. Intelligent optimization approaches or meta heuristic algorithms like, genetic algorithm(GA), neural networks(NN) based on artificial intelligence(AI), particle swarm optimization(PSO) technique and simulated annealing(SA) in the recent years have well consigned QOS and privacy issues. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET. Biometrics are more advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. The foremost requirement of our protocol is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack unauthorized data modification impersonation etc. that are caused by malicious node in MANET. This problem is tackled by crypt-biometric and trust application inculcated by meta-heuristic algorithm in our proposed approach which helps in securing ad-hoc networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sustaining Security in Manet through Biometric Technique Inculcating Meta-heuristic Algorithm Sherin Zafar, Dr.m.k Soni

The paper comprehends an impending accost of intensifying biometric stationed authentication technique bestowing meta-heuristic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET as they are advantageous and secure as compared to prevailing data security te...

متن کامل

Power Optimized Secure AODV Routing Protocol Based on Mobile Agents

In Mobile ad-hoc networks (MANET), route optimization and power conservation are the critical issues and a requirement of an efficient routing protocol is always there to make the MANET reliable and tackle these issues. In recent years, researchers have proposed various routing algorithms to save the resources of the node such as energy, bandwidth, and computing power etc. Power Conservation is...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Intelligent Framework for Qos Optimization in Manet Using Soft Computing Models

Mobile Adhoc Networks (MANET) is a heterogeneous self configuring networks that changes topology often. Due to mobility nature of wireless nodes, routing information needs to be frequently updated. As nodes are wireless in nature, there exists enormous security threats that disturb the deployment and maintenance of MANET. To alleviate such problems, secure agent based multicast routing protocol...

متن کامل

Discovering a Secure Path in MANET by Avoiding Black Hole Attack

In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014