Skip to main content
Log in

Continuous authentication consoles in mobile ad hoc network (MANET)

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Security in mobile ad-hoc networks (MANETs) is a key issue to be addressed. There are two separate approaches for security in MANETs viz., continuous authentication and intrusion detection. Previous studies in this regard involved a study of the two classes of issues separately. In this work these two classes of security approaches are integrated and combined into a single console. Continuous authentication acts as the first line of defense while intrusion detection system acts as the second. In this framework, biometric authentication is used for continuous authentication. The intrusion detection system has a detection engine and a response engine. The detection engine detects the malicious intruder and the response engine completely eliminates the above detected intruder from the network. The analysis of the security issues is simulated to produce the necessary results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6, 46–55 (1999)

    Article  Google Scholar 

  2. Yang, H., Luo, H., Ye, F., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)

    Article  Google Scholar 

  3. Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-Hoc Networks. Lecture Notes in Computer Science, vol. 2288, pp. 341–354. Springer, Berlin (2001)

    MATH  Google Scholar 

  4. Xiao, Q.: A biometric authentication approach for high security ad-hoc networks. In: Proceeding of IEEE Information Assurance Workshop, West Point, NY (2004)

  5. Ross, A., Jain, A.K.: Multimodal biometrics: an overview. In: Proceeding of 12th European Signal Processing Conference, Vienna, Austria (2004)

  6. Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceeding of 2nd Workshop on Multimodal User Authentication, Toulouse, France (2006)

  7. Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. Mob. Netw. Appl. 9(5), 45–56 (2003)

    Google Scholar 

  8. Ren, K., Lou, W., Kim, K., Fang, Y.: A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Trans. Veh. Technol. 55(4), 1373–1384 (2006)

    Article  Google Scholar 

  9. Kaushik, R., Singhai, J.: Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network. IET Netw. 4(2), 148–157 (2015)

    Article  Google Scholar 

  10. Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, Peter: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)

    Article  Google Scholar 

  11. Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)

    Article  Google Scholar 

  12. Kontik, M., Ergen, S.C.: Distributed medium access control protocol for successive interference cancellation-based wireless ad hoc networks. IEEE Commun. Lett. 21(2), 354–357 (2017)

    Article  Google Scholar 

  13. Kulathumani, V., Arora, A., Sridharan, M., Parker, K., Lemon, Bryan: On the repair time scaling wall for MANETs. IEEE Commun. Lett. 20(8), 1623–26 (2016)

    Article  Google Scholar 

  14. Kang, Myung Gil, Kim, Young-bin, Lee, Jung Hoon, Choi, Wan: Secrecy capacity scaling by jamming-aided hierarchical cooperation in ad hoc networks. IEEE J. Sel. Top. Signal Process. 10(8), 1390–1403 (2016)

    Article  Google Scholar 

  15. Zhang, Y., Lazos, L., Kozma Jr., W.: AMD: audit-based misbehavior detection in wireless ad hoc networks. IEEE Trans. Mob. Comput. 15(8), 1893–1907 (2016)

    Article  Google Scholar 

  16. Cai, C., Cai, Y., Zhou, X., Yang, W., Yang, Wendong: When does relay transmission give a more secure connection in wireless ad hoc networks? IEEE Trans. Inf. Forensics Secur. 9(4), 624–632 (2014)

    Article  Google Scholar 

  17. Zuo, J., Dong, C., Ng, S.X.: Cross-layer aided energy-efficient routing design for ad hoc networks. IEEE Commun. Surv. Tutor. 17(3), 1214–1237 (2015)

    Article  Google Scholar 

  18. Madan, R., Mehta, N.B., Molisch, A.F., Zhang, J.: Energy-efficient decentralized cooperative routing in wireless networks. IEEE Trans. Autom. Control 54(3), 512–527 (2009)

    Article  MathSciNet  Google Scholar 

  19. Anand, A., Aggarwal, H., Rani, Rinkle: Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. J. Commun. Netw. 18(6), 938–947 (2016)

    Article  Google Scholar 

  20. Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst. J. 11(2), 449–459 (2017)

    Article  MathSciNet  Google Scholar 

  21. Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, Asaf: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mob. Comput. 16(8), 2174–2183 (2017)

    Article  Google Scholar 

  22. NS-2: www.isi.edu/nsnam

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Ramkumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramkumar, D., Annadurai, C. & Nirmaladevi, K. Continuous authentication consoles in mobile ad hoc network (MANET). Cluster Comput 22 (Suppl 4), 7777–7786 (2019). https://doi.org/10.1007/s10586-017-1386-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1386-2

Keywords

Navigation