CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS � A Survey

Published on December 2013 by M. Ambika, R. V. Nataraj
International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
Foundation of Computer Science USA
ICIIIOES - Number 5
December 2013
Authors: M. Ambika, R. V. Nataraj
85fa4555-bf7b-4d3f-bd2d-08008781c99d

M. Ambika, R. V. Nataraj . Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS � A Survey. International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences. ICIIIOES, 5 (December 2013), 23-26.

@article{
author = { M. Ambika, R. V. Nataraj },
title = { Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS � A Survey },
journal = { International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences },
issue_date = { December 2013 },
volume = { ICIIIOES },
number = { 5 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 23-26 },
numpages = 4,
url = { /proceedings/iciiioes/number5/14313-1503/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%A M. Ambika
%A R. V. Nataraj
%T Intrusion Detection and Continuous Authentication using Multimodal Biometrics in MANETS � A Survey
%J International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%@ 0975-8887
%V ICIIIOES
%N 5
%P 23-26
%D 2013
%I International Journal of Computer Applications
Abstract

Mobile ad hoc networks (MANET) have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. The mobile nodes are exposed to various kinds of attacks and most of the times the intruders get into network, in order to hold illegal authority over the nodes. Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Intrusion detection is considered as the prevention based approach for securing the MANETs. This paper aims to classify various intrusion detection techniques used in MANETs. Also this paper showcases process of continuous authentication through multimodal biometric technique.

References
  1. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong, "A New Routing Attack in Mobile Ad Hoc Networks," International Journal of Information Technology Vol. 11 No. 2.
  2. Q. Xiao, "A biometric authentication approach for high security ad-hocnetworks," in Proc. IEEE Info. Assurance Workshop, West Point, NY,June 2004.
  3. A. Ross and A. K. Jain, "Multimodal biometrics: an overview," in Proc. 12th European Signal Proc. Conf. , Vienna, Austria, 2004.
  4. A. Ross and A. K. Jain, "Information fusion in biometrics," PatternRecognition Lett. , vol. 24, pp. 2115-2225, Sept. 2003.
  5. Sim T, Zhang S, R. Janakiraman and S. Kumar, "Continuous verification using multimodal biometrics," IEEE Trans. Pattern Anal. Mach. Intell. 2007; vol. 29, pp. 687-700.
  6. Korman J, A C Morris, D Wu and S. A. Jassim, "Multi-modal biometrics authentication on the secure phone PDA," in Proc. 2nd Workshop Multimodal User Authentication, Toulouse, France, May 2006.
  7. Altinok A, M Turk, "Temporal integration for continuous multimodal biometrics," in Proc. Workshop Multimodal User Authentication, Santa Barbara, CA, Dec. 2003.
  8. Muncaster J, Turk M, "Continuous multimodal authentication using dynamic Bayesian networks," in Proc. 2nd Workshop Multimodal User Authentication, Toulouse, France, May 2006.
  9. A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wire-less Ad Hoc Networks," IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, February 2004.
  10. H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, N. Kato, "A Dynamic Anomaly Detection Scheme for AODVBasedMobile Ad Hoc Networks," IEEE Transactions onVehicular Technology, vol. 58, no. 5, pp. 2471-2481, Jun 2009.
  11. C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "AdHoc On-Demand Distance Vector Routing", IETF RFC 3561,July 2003.
  12. S. Bu, F. Yu, X. Liu, P. Mason and H. Tang, "Distributedcombined authentication and intrusion detection with data fusionin high-security mobile ad hoc networks," IEEE Transactions onVehicular Technology, vol 60 no. 3 pp. 1025–1036, March 2011.
  13. Noman Mohammed Hadi Otrok, Lingyu Wang, MouradDebbabi and Prabir Bhattacharya, "Mechanism Design-BasedSecure Leader Election Model for Intrusion Detection inMANET" IEEE Transactions on dependable and SecureComputing, vol 8, no 1, Jan-Feb 2011.
  14. Sevil Sen, John A. Clark "Evolutionary computationtechniques for intrusion detection in mobile ad hoc networks". Computer Networks Vol 55, Issue 15, pp. 3441-3457,211.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networks Intrusion Detection Multimodal Biometrics Intruders