Skip to main content

A Secure Authentication System Using Multimodal Biometrics for High Security MANETs

  • Conference paper
Advances in Computing and Information Technology (ACITY 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 198))

Abstract

Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic, multi hop radio network without any fixed infrastructure. The main challenge in the design of such networks is how to provide security for the information which is communicated through the network. Biometrics provides possible solutions for this problem in MANET since it has the direct connection with user identity and needs little user interruption.

This proposed Multimodal Biometric-based Authentication Combined Security System provides authentication using face biometrics and security using fingerprint biometrics. The proposed system has three advantages compared to previous works. First, for authentication, eigenface of the sender is generated and is attached to the data to be transferred. Second, to enhance security, the data and the eigenface of the sender is encrypted by using the key which is extracted from the fingerprint biometric of the receiver. Third, to reduce a transmission-based attack, the fingerprint based cryptographic key is randomized by applying a genetic operator. Thus, this security system provides authentication, security and revocability for high security applications in mobile environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stallings, W.: Cryptography and Network Security – Principles and Practices, 3rd edn. Pearson Education, London (2004)

    Google Scholar 

  2. Trivedi, A.K., Arora, R., Kapoor, R., Sanyal, S., Abraham, A., Sanyal, S.: Mobile Ad Hoc Network Security Vulnerabilities. IGI Global (2009)

    Google Scholar 

  3. Maio, M.D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  4. Li, S.Z., Jain, A.K.: Handbook of Face Recognition. Springer, Heidelberg (2005)

    MATH  Google Scholar 

  5. Fessi, B.A., Ben Abdallah, S., Boudriga, H.M.: A new genetic algorithm approach for intrusion response system in computer networks. In: IEEE Symposium on Computers and Communications (2009)

    Google Scholar 

  6. Xiao, Q.: A Biometric Authentication Approach for High Security Ad hoc Networks. In: Proceedings of IEEE Workshop on Info. Assistance (2004)

    Google Scholar 

  7. Liu, J., Richard Yu, F., Lung, C.-H., Tang, H.: Optimal Biometric-Based Continuous Authentication in Mobile Ad hoc Networks. In: Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2007)

    Google Scholar 

  8. Ananda Krishna, B., Radha, S., Chenna Kesava Reddy, K.: Data Security in Ad hoc Networks using Randomization of Cryptographic Algorithms. Journal of Applied Sciences 7(24), 4007–4012 (2007)

    Article  Google Scholar 

  9. Jagadeesan, A., Thillaikkarasi, T., Duraiswamy, K.: Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature. International Journal of Computer Applications 2(6), 975–8887 (2010)

    Article  Google Scholar 

  10. Shanthini, B., Swamynathan, S.: A Cancelable Biometric-Based Security System for Mobile Ad Hoc Networks. In: International Conference on Computer Technology (ICONCT 2009), pp. 179–184 (2009)

    Google Scholar 

  11. Kanade, S., Petrovska-Delacretaz, Dorizzi, B.: Generating and Sharing Biometrics Based Session Keys for Secure Cryptographic Applications. In: Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (2010)

    Google Scholar 

  12. Shanthini, B., Swamynathan, S.: Data Security in Mobile Ad Hoc Networks using Genetic Based Biometrics. International Journal of Computer Science and Information Security 8(6), 149–153 (2010)

    Google Scholar 

  13. Kim, A.-Y., Lee, S.-H.: Authentication Protocol Using Fuzzy Eigenface Vault Based On Moc. In: International Conference on Advanced Communication Technology, pp. 1771–1775 (2007)

    Google Scholar 

  14. Shanthini, B., Swamynathan, S.: A Security System using Genetic Based Face Biometrics for MANETs. In: International Conference on Intelligent Systems and /Technology (March 2011) (Selected Paper)

    Google Scholar 

  15. Zarza, L., Pegueroles, J., Soriano, M.: Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. In: International Conference on Database and Expert Systems Applications (2007)

    Google Scholar 

  16. http://www-cs-students.stanford.edu/~robles/ee368/main.html

  17. Ramesh, R., Kasturi, R., Schunck, B.: Machine Vision, pp. 31–51. McGraw Hill, New York (1995)

    Google Scholar 

  18. Usman Akram, M., Tariq, A., Khan, S.A.: Fingerprint Image: pre- and post-processing. International Journal of Biometrics 1(1) (2008)

    Google Scholar 

  19. Wu, Z.-l., Li, C.-h. (eds.): Feature Extraction, Foundations and Applications. Springer, Heidelberg (2006)

    Google Scholar 

  20. Zhang, W., Zhang, G., Chen, T.: Security analysis for Key generation Systems using Face Images. In: International Conference on Image Processing, pp. 3455–3458 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shanthini, B., Swamynathan, S. (2011). A Secure Authentication System Using Multimodal Biometrics for High Security MANETs. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Computing and Information Technology. ACITY 2011. Communications in Computer and Information Science, vol 198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22555-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22555-0_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22554-3

  • Online ISBN: 978-3-642-22555-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics