Stretch and Shrink Method for Security in MANET Using Biometric and Intrusion Detection System

Authors

  • Dr. P. Prabhusundhar  Assistant Professor, Computer Science Gobi Arts & Science College (Autonomous) Gobichettipalayam, Tamilnadu, India
  • Dr. B. Srinivasan  Assistant Professor, Computer Science Gobi Arts & Science College (Autonomous) Gobichettipalayam, Tamilnadu, India
  • Dr. M. Ramalingam   Assistant Professor, Computer Science Gobi Arts & Science College (Autonomous) Gobichettipalayam, Tamilnadu, India

Keywords:

MANET, WCA, rule mining, stretch and shrink, Intrusion Detection, Security.

Abstract

Mobile ad hoc is an infrastructure less dynamic network used in many applications; it has been target of various attacks and it makes security problems. The MANET is a collection of autonomous wireless nodes, in which each node changes its geographical position frequently and acts as a router to forward packets. This work aims to provide an enhanced level of security by using the prevention based and detection based approaches such as authentication and intrusion detection. The multi-model biometric technology is used for continuous authentication and intrusion detection in high security cluster based MANET. In this paper, an attempt has been made to combine continuous authentication and intrusion detection. In this scheme, Dempster-Shafer theory is used for data fusion because more than one device needs to be chosen and their observation can be fused to increase observation accuracy. The topology stability and network scalability are playing a significant role in mobile ad hoc to determining the network performance. Hence an attempt has been made to analyze the factors such as nearest neighbor and association rule mining in the ad hoc network’s bench mark algorithms such as LCA2, load balance, adaptive multi-hop algorithm and Basagni’s DCA and DMAC to form a clustered mobile ad hoc network.

References

  1. Chengyu liu, lina zhao," A new algorithm of nodes partition using for ad hoc network model", proceedings of ieee ic-bnmt2011, 978-1-61284-159- 5, 2011-ieee
  2. Jahangir khan, Dr.syed Irfan Hyder, Dr.Syed Malek Fakar Duani syed Mustafa , International Journal of Grid and Distributed Computing, "Modeling and Simulation Of Dynamic Intermediate Nodes And Performance Analysis in MANETS Reactive Routing protocols" Vol. 4, No. 1, March 2011
  3. Ramalingam. M, Dr.Thiagarasu.V , Narendran.P, "Periodical and On-Demand Topology Dissemination in routing protocols: A comprehensive Analysis based on Delay, Delivery Ratio and Throughput", International Journal of Advanced and Innovative Research (2278-7844) / # 123 / Volume 2 Issue 9, 2013
  4. C. E. Perkins, E. M. Royer, S. R. Das, M. K. Marina. "Performance comparison of two on-demand routing protocols for ad hoc networks", IEEE Personal Communications, 2001, 2: 16-28
  5. Ratish Agarwal, Roopam Gupta, and Mahesh Motwani," Energy Aware Load Balancing Clustering in Mobile Ad Hoc Networks", International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 2, Issue 1 (2014) ISSN 2320-401X; EISSN 2320-4028
  6. Yi Xu and Wenye Wang, "Topology Stability Analysis and Its Application in Hierarchical Mobile Ad Hoc Networks", IEEE transactions on vehicular technology, vol. 58, no: 3, march 2009
  7. Prerna Malhotra, Ajay Dureja, "A Survey of Weight-Based Clustering Algorithms in MANET", IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 34-40 8D.J.Baker and A. Ephremides, "The architectural
  8. A. D. Amis and R. Prakash, "Load-Balancing Clusters in Wireless Ad Hoc Networks", in Proc. 3rd IEEE ASSET’00, Mar. 2000, pp. 25–32
  9. ChetnaKaushal, Naveen Bilandi, "A Review: Clumping in Mobile Ad hoc Networks", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 4, April 2014, ISSN(Online): 2320-9801, ISSN (Print): 2320-9798
  10. Abdel Rahman H. Hussein, Sufian Yousef, and Omar Arabiyat," A Load-Balancing and Weighted Clustering Algorithm in Mobile Ad-Hoc Network", IT Security conference for the Next Generation, University of East London, London, UK, Vovember21-22-2009
  11. A. Ephremides, J. E. Wieselthier, and D. J. Baker," A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling", Proceedings of IEEE, 75(1):56–73, 1987
  12. D.J. Baker and A. Ephremides, "A distributed algorithm for organizing mobile Radio telecommunication networks", in: Proceedings of the 2nd International Conference on Distributed Computer Systems, April 1981, pp. 476–483
  13. Ratish Agarwal, Dr. Mahesh Motwani, "Survey of clustering algorithms for MANET", Ratish Agarwal.et al, International Journal on Computer Science and Engineering Vol.1(2), 2009, 98-104
  14. M. Gerla and J. T. Tsai, "Multiuser, Mobile, Multimedia Radio Network," Wireless Networks, vol.1, Oct. 1995, pp. 255–265.
  15. A.K. Parekh, "Selecting routers in ad-hoc wireless networks", in: Proceedings of the SBT/IEEE International Telecommunications Symposium, August 1994.
  16. Ramalingam M and Dr. Thiagarasu V., 2014], "Cluster Based Stretch and Shrink Method for Manet Using Load Balancing, Nearest Neighbor and Rule Mining", International Journal of Engineering Sciences & Research Technology.
  17. Prabhusundhar P and Dr. Srinivasan B., 2016], "Multimodal Biometric and Weighted Clustering Algorithm for Authentication Based Intrusion Detection System for Clustered MANET Using POMDP", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), ISSN (Online): 2277 128X, ISSN (Print): 2277 6451, Vol. 6, No. 3, March-2016.
  18. Prabhusundhar P and Dr. Srinivasan B., 2016], "Multimodal Biometric Based Intrusion Detection System For Clustered Mobile Ad Hoc Network Using POMDP Algorithm", KASMERA Journal (Science Citation Indexed Journal), ISSN: 0075-5222, Vol. 44, No. 1, pp. 2-9.
  19. Aarti and Tyagi S.S., 2013], "Study of MANET: Characteristics, Challenges, Application and Security Attacks", International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3(5), pp. 252-257.
  20. Adnan Nadeem, Michael and Howarth., "An Intrusion Detection & Adaptive Response Mechanism for MANETs", Journal of Elsevier.
  21. Aguilar G, Sanchez G, Toscano K, Nakano M and Perez H., 2007], "Multimodal Biometric System using Fingerprint", in the proceedings of Int. Conf. Intell. Adv. Syst. 2007, DOI: 10.1109/ICIAS.2007.4658364, pp. 145-150.
  22. Ali Dorri and Seyed Reza Kamel and Esmail kheyrkhah, 2015], "Security Challenges in Mobile Ad Hoc Networks: A Survey", International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 6, No. 1, pp. 15-29, February 2015..

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. P. Prabhusundhar, Dr. B. Srinivasan, Dr. M. Ramalingam , " Stretch and Shrink Method for Security in MANET Using Biometric and Intrusion Detection System, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.455-462, March-April-2018.