Abstract
Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic, multi hop radio network without any fixed infrastructure. The main challenge in the design of such networks is how to provide security for the information which is communicated through the network. Biometrics provides possible solutions for this problem in MANET since it has the direct connection with user identity and needs little user interruption.
This proposed Multimodal Biometric-based Authentication Combined Security System provides authentication using face biometrics and security using fingerprint biometrics. The proposed system has three advantages compared to previous works. First, for authentication, eigenface of the sender is generated and is attached to the data to be transferred. Second, to enhance security, the data and the eigenface of the sender is encrypted by using the key which is extracted from the fingerprint biometric of the receiver. Third, to reduce a transmission-based attack, the fingerprint based cryptographic key is randomized by applying a genetic operator. Thus, this security system provides authentication, security and revocability for high security applications in mobile environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stallings, W.: Cryptography and Network Security – Principles and Practices, 3rd edn. Pearson Education, London (2004)
Trivedi, A.K., Arora, R., Kapoor, R., Sanyal, S., Abraham, A., Sanyal, S.: Mobile Ad Hoc Network Security Vulnerabilities. IGI Global (2009)
Maio, M.D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Li, S.Z., Jain, A.K.: Handbook of Face Recognition. Springer, Heidelberg (2005)
Fessi, B.A., Ben Abdallah, S., Boudriga, H.M.: A new genetic algorithm approach for intrusion response system in computer networks. In: IEEE Symposium on Computers and Communications (2009)
Xiao, Q.: A Biometric Authentication Approach for High Security Ad hoc Networks. In: Proceedings of IEEE Workshop on Info. Assistance (2004)
Liu, J., Richard Yu, F., Lung, C.-H., Tang, H.: Optimal Biometric-Based Continuous Authentication in Mobile Ad hoc Networks. In: Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2007)
Ananda Krishna, B., Radha, S., Chenna Kesava Reddy, K.: Data Security in Ad hoc Networks using Randomization of Cryptographic Algorithms. Journal of Applied Sciences 7(24), 4007–4012 (2007)
Jagadeesan, A., Thillaikkarasi, T., Duraiswamy, K.: Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature. International Journal of Computer Applications 2(6), 975–8887 (2010)
Shanthini, B., Swamynathan, S.: A Cancelable Biometric-Based Security System for Mobile Ad Hoc Networks. In: International Conference on Computer Technology (ICONCT 2009), pp. 179–184 (2009)
Kanade, S., Petrovska-Delacretaz, Dorizzi, B.: Generating and Sharing Biometrics Based Session Keys for Secure Cryptographic Applications. In: Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (2010)
Shanthini, B., Swamynathan, S.: Data Security in Mobile Ad Hoc Networks using Genetic Based Biometrics. International Journal of Computer Science and Information Security 8(6), 149–153 (2010)
Kim, A.-Y., Lee, S.-H.: Authentication Protocol Using Fuzzy Eigenface Vault Based On Moc. In: International Conference on Advanced Communication Technology, pp. 1771–1775 (2007)
Shanthini, B., Swamynathan, S.: A Security System using Genetic Based Face Biometrics for MANETs. In: International Conference on Intelligent Systems and /Technology (March 2011) (Selected Paper)
Zarza, L., Pegueroles, J., Soriano, M.: Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. In: International Conference on Database and Expert Systems Applications (2007)
Ramesh, R., Kasturi, R., Schunck, B.: Machine Vision, pp. 31–51. McGraw Hill, New York (1995)
Usman Akram, M., Tariq, A., Khan, S.A.: Fingerprint Image: pre- and post-processing. International Journal of Biometrics 1(1) (2008)
Wu, Z.-l., Li, C.-h. (eds.): Feature Extraction, Foundations and Applications. Springer, Heidelberg (2006)
Zhang, W., Zhang, G., Chen, T.: Security analysis for Key generation Systems using Face Images. In: International Conference on Image Processing, pp. 3455–3458 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shanthini, B., Swamynathan, S. (2011). A Secure Authentication System Using Multimodal Biometrics for High Security MANETs. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Computing and Information Technology. ACITY 2011. Communications in Computer and Information Science, vol 198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22555-0_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-22555-0_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22554-3
Online ISBN: 978-3-642-22555-0
eBook Packages: Computer ScienceComputer Science (R0)