Abstract
Security in mobile ad-hoc networks (MANETs) is a key issue to be addressed. There are two separate approaches for security in MANETs viz., continuous authentication and intrusion detection. Previous studies in this regard involved a study of the two classes of issues separately. In this work these two classes of security approaches are integrated and combined into a single console. Continuous authentication acts as the first line of defense while intrusion detection system acts as the second. In this framework, biometric authentication is used for continuous authentication. The intrusion detection system has a detection engine and a response engine. The detection engine detects the malicious intruder and the response engine completely eliminates the above detected intruder from the network. The analysis of the security issues is simulated to produce the necessary results.
Similar content being viewed by others
References
Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6, 46–55 (1999)
Yang, H., Luo, H., Ye, F., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)
Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-Hoc Networks. Lecture Notes in Computer Science, vol. 2288, pp. 341–354. Springer, Berlin (2001)
Xiao, Q.: A biometric authentication approach for high security ad-hoc networks. In: Proceeding of IEEE Information Assurance Workshop, West Point, NY (2004)
Ross, A., Jain, A.K.: Multimodal biometrics: an overview. In: Proceeding of 12th European Signal Processing Conference, Vienna, Austria (2004)
Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceeding of 2nd Workshop on Multimodal User Authentication, Toulouse, France (2006)
Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. Mob. Netw. Appl. 9(5), 45–56 (2003)
Ren, K., Lou, W., Kim, K., Fang, Y.: A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Trans. Veh. Technol. 55(4), 1373–1384 (2006)
Kaushik, R., Singhai, J.: Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network. IET Netw. 4(2), 148–157 (2015)
Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, Peter: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)
Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)
Kontik, M., Ergen, S.C.: Distributed medium access control protocol for successive interference cancellation-based wireless ad hoc networks. IEEE Commun. Lett. 21(2), 354–357 (2017)
Kulathumani, V., Arora, A., Sridharan, M., Parker, K., Lemon, Bryan: On the repair time scaling wall for MANETs. IEEE Commun. Lett. 20(8), 1623–26 (2016)
Kang, Myung Gil, Kim, Young-bin, Lee, Jung Hoon, Choi, Wan: Secrecy capacity scaling by jamming-aided hierarchical cooperation in ad hoc networks. IEEE J. Sel. Top. Signal Process. 10(8), 1390–1403 (2016)
Zhang, Y., Lazos, L., Kozma Jr., W.: AMD: audit-based misbehavior detection in wireless ad hoc networks. IEEE Trans. Mob. Comput. 15(8), 1893–1907 (2016)
Cai, C., Cai, Y., Zhou, X., Yang, W., Yang, Wendong: When does relay transmission give a more secure connection in wireless ad hoc networks? IEEE Trans. Inf. Forensics Secur. 9(4), 624–632 (2014)
Zuo, J., Dong, C., Ng, S.X.: Cross-layer aided energy-efficient routing design for ad hoc networks. IEEE Commun. Surv. Tutor. 17(3), 1214–1237 (2015)
Madan, R., Mehta, N.B., Molisch, A.F., Zhang, J.: Energy-efficient decentralized cooperative routing in wireless networks. IEEE Trans. Autom. Control 54(3), 512–527 (2009)
Anand, A., Aggarwal, H., Rani, Rinkle: Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. J. Commun. Netw. 18(6), 938–947 (2016)
Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst. J. 11(2), 449–459 (2017)
Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, Asaf: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mob. Comput. 16(8), 2174–2183 (2017)
NS-2: www.isi.edu/nsnam
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ramkumar, D., Annadurai, C. & Nirmaladevi, K. Continuous authentication consoles in mobile ad hoc network (MANET). Cluster Comput 22 (Suppl 4), 7777–7786 (2019). https://doi.org/10.1007/s10586-017-1386-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1386-2