Secure Routing in MANET through Crypt-Biometric Technique | SpringerLink
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

Abstract

A dynamic network self configuring and multi-hop in nature without having any fixed infrastructure is called a mobile ad-hoc network(MANET).The main drawback of such types of networks is the occurrence of various attacks such as unauthorized data modification impersonation etc which affect their performance. Biometric perception is specified as the most novel method to protract security in various networks by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. Simulation as well as experimental results signifies that this proposed method achieves better performance parameters values for various mobile ad-hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 22879
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 28599
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Daugmann, J.: Proceedings of International Conference on Image Processing (2002)

    Google Scholar 

  2. Khaw, P.: Iris Recognition Technology for Improved Authentication. In: SANS Security Essential (GSEC) Practical Assignment, version 1.3, SANS Institute, 5–8 (2002)

    Google Scholar 

  3. Masek, L.: Recognition of Human Eye Iris Patterns for Biometric Identification. University of West California (2003)

    Google Scholar 

  4. Daugmann, J.: High Confidence Visual Recognition of Persons by a test of Statistical Independence. IEEE Trans. on Pattern Analysis and Machine Intelligence 15(11) (1993)

    Google Scholar 

  5. Daugmann, J.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers (1999)

    Google Scholar 

  6. Sherin Zafar, M.K.: Soni.:Sustaining Security In MANET through Biometric Technique. Engineering Sciences International Research Journal, 41–44 (2014)

    Google Scholar 

  7. Daugmann, J.: How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology (CSVT) 14(1), 21–30 (2004)

    Article  Google Scholar 

  8. Zafar, S., Soni, M.K.: Trust Based QOS Protocol (TBQP) using Meta-heuristic Genetic Algorithm for Optimizing and Securing MANET. In: IEEE International Conference on Reliability, Optimization & Information Technology (ICROIT), pp. 173–177 (2015)

    Google Scholar 

  9. Wildes, R.P.: Iris Recognition: An emerging biometric technology. Proceedings of the IEEE 85(9), 1348–1363 (1997)

    Article  Google Scholar 

  10. Wildes, R.P., Asmuth, J.C., Hsu, C., Kolczynski, R.J., Matey, J.R., McBride, S.E.: Automated,non invasive iris recognition system and method. U.S Patent 5, 572–596 (1996)

    Google Scholar 

  11. Misiti, M., Misiti, Y., Oppenheim, G., Poggi, J.: Wavelet Toolbox 4 User’s Guide (1997-2009)

    Google Scholar 

  12. Xiao, Q.: A Biometric Authentication Approach for High Security Ad hoc Networks. In: Proceedings of IEEE Workshop on Information Assistance, pp. 250–256 (2004)

    Google Scholar 

  13. Liu, J., Yu, F.R., Lung, C.-H., Tang, H.: Optimal Biometric-Based Continuous Authentication in Mobile Ad hoc Networks. In: Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 76–81 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zafar Sherin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sherin, Z., Soni, M.K. (2015). Secure Routing in MANET through Crypt-Biometric Technique. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_79

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics