Abstract
A dynamic network self configuring and multi-hop in nature without having any fixed infrastructure is called a mobile ad-hoc network(MANET).The main drawback of such types of networks is the occurrence of various attacks such as unauthorized data modification impersonation etc which affect their performance. Biometric perception is specified as the most novel method to protract security in various networks by involving exclusive identification features. The attainment of biometric perception depends upon image procurement and biometric perception system. Simulation as well as experimental results signifies that this proposed method achieves better performance parameters values for various mobile ad-hoc networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Daugmann, J.: Proceedings of International Conference on Image Processing (2002)
Khaw, P.: Iris Recognition Technology for Improved Authentication. In: SANS Security Essential (GSEC) Practical Assignment, version 1.3, SANS Institute, 5–8 (2002)
Masek, L.: Recognition of Human Eye Iris Patterns for Biometric Identification. University of West California (2003)
Daugmann, J.: High Confidence Visual Recognition of Persons by a test of Statistical Independence. IEEE Trans. on Pattern Analysis and Machine Intelligence 15(11) (1993)
Daugmann, J.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers (1999)
Sherin Zafar, M.K.: Soni.:Sustaining Security In MANET through Biometric Technique. Engineering Sciences International Research Journal, 41–44 (2014)
Daugmann, J.: How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology (CSVT) 14(1), 21–30 (2004)
Zafar, S., Soni, M.K.: Trust Based QOS Protocol (TBQP) using Meta-heuristic Genetic Algorithm for Optimizing and Securing MANET. In: IEEE International Conference on Reliability, Optimization & Information Technology (ICROIT), pp. 173–177 (2015)
Wildes, R.P.: Iris Recognition: An emerging biometric technology. Proceedings of the IEEE 85(9), 1348–1363 (1997)
Wildes, R.P., Asmuth, J.C., Hsu, C., Kolczynski, R.J., Matey, J.R., McBride, S.E.: Automated,non invasive iris recognition system and method. U.S Patent 5, 572–596 (1996)
Misiti, M., Misiti, Y., Oppenheim, G., Poggi, J.: Wavelet Toolbox 4 User’s Guide (1997-2009)
Xiao, Q.: A Biometric Authentication Approach for High Security Ad hoc Networks. In: Proceedings of IEEE Workshop on Information Assistance, pp. 250–256 (2004)
Liu, J., Yu, F.R., Lung, C.-H., Tang, H.: Optimal Biometric-Based Continuous Authentication in Mobile Ad hoc Networks. In: Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 76–81 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sherin, Z., Soni, M.K. (2015). Secure Routing in MANET through Crypt-Biometric Technique. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_79
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_79
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)