Skip to main content
Erschienen in: Cluster Computing 4/2019

24.11.2017

Continuous authentication consoles in mobile ad hoc network (MANET)

verfasst von: D. Ramkumar, C. Annadurai, K. Nirmaladevi

Erschienen in: Cluster Computing | Sonderheft 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security in mobile ad-hoc networks (MANETs) is a key issue to be addressed. There are two separate approaches for security in MANETs viz., continuous authentication and intrusion detection. Previous studies in this regard involved a study of the two classes of issues separately. In this work these two classes of security approaches are integrated and combined into a single console. Continuous authentication acts as the first line of defense while intrusion detection system acts as the second. In this framework, biometric authentication is used for continuous authentication. The intrusion detection system has a detection engine and a response engine. The detection engine detects the malicious intruder and the response engine completely eliminates the above detected intruder from the network. The analysis of the security issues is simulated to produce the necessary results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6, 46–55 (1999)CrossRef Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6, 46–55 (1999)CrossRef
2.
Zurück zum Zitat Yang, H., Luo, H., Ye, F., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRef Yang, H., Luo, H., Ye, F., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRef
3.
Zurück zum Zitat Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-Hoc Networks. Lecture Notes in Computer Science, vol. 2288, pp. 341–354. Springer, Berlin (2001)MATH Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-Hoc Networks. Lecture Notes in Computer Science, vol. 2288, pp. 341–354. Springer, Berlin (2001)MATH
4.
Zurück zum Zitat Xiao, Q.: A biometric authentication approach for high security ad-hoc networks. In: Proceeding of IEEE Information Assurance Workshop, West Point, NY (2004) Xiao, Q.: A biometric authentication approach for high security ad-hoc networks. In: Proceeding of IEEE Information Assurance Workshop, West Point, NY (2004)
5.
Zurück zum Zitat Ross, A., Jain, A.K.: Multimodal biometrics: an overview. In: Proceeding of 12th European Signal Processing Conference, Vienna, Austria (2004) Ross, A., Jain, A.K.: Multimodal biometrics: an overview. In: Proceeding of 12th European Signal Processing Conference, Vienna, Austria (2004)
6.
Zurück zum Zitat Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceeding of 2nd Workshop on Multimodal User Authentication, Toulouse, France (2006) Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceeding of 2nd Workshop on Multimodal User Authentication, Toulouse, France (2006)
7.
Zurück zum Zitat Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. Mob. Netw. Appl. 9(5), 45–56 (2003) Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. Mob. Netw. Appl. 9(5), 45–56 (2003)
8.
Zurück zum Zitat Ren, K., Lou, W., Kim, K., Fang, Y.: A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Trans. Veh. Technol. 55(4), 1373–1384 (2006)CrossRef Ren, K., Lou, W., Kim, K., Fang, Y.: A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Trans. Veh. Technol. 55(4), 1373–1384 (2006)CrossRef
9.
Zurück zum Zitat Kaushik, R., Singhai, J.: Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network. IET Netw. 4(2), 148–157 (2015)CrossRef Kaushik, R., Singhai, J.: Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network. IET Netw. 4(2), 148–157 (2015)CrossRef
10.
Zurück zum Zitat Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, Peter: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)CrossRef Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, Peter: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)CrossRef
11.
Zurück zum Zitat Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)CrossRef Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)CrossRef
12.
Zurück zum Zitat Kontik, M., Ergen, S.C.: Distributed medium access control protocol for successive interference cancellation-based wireless ad hoc networks. IEEE Commun. Lett. 21(2), 354–357 (2017)CrossRef Kontik, M., Ergen, S.C.: Distributed medium access control protocol for successive interference cancellation-based wireless ad hoc networks. IEEE Commun. Lett. 21(2), 354–357 (2017)CrossRef
13.
Zurück zum Zitat Kulathumani, V., Arora, A., Sridharan, M., Parker, K., Lemon, Bryan: On the repair time scaling wall for MANETs. IEEE Commun. Lett. 20(8), 1623–26 (2016)CrossRef Kulathumani, V., Arora, A., Sridharan, M., Parker, K., Lemon, Bryan: On the repair time scaling wall for MANETs. IEEE Commun. Lett. 20(8), 1623–26 (2016)CrossRef
14.
Zurück zum Zitat Kang, Myung Gil, Kim, Young-bin, Lee, Jung Hoon, Choi, Wan: Secrecy capacity scaling by jamming-aided hierarchical cooperation in ad hoc networks. IEEE J. Sel. Top. Signal Process. 10(8), 1390–1403 (2016)CrossRef Kang, Myung Gil, Kim, Young-bin, Lee, Jung Hoon, Choi, Wan: Secrecy capacity scaling by jamming-aided hierarchical cooperation in ad hoc networks. IEEE J. Sel. Top. Signal Process. 10(8), 1390–1403 (2016)CrossRef
15.
Zurück zum Zitat Zhang, Y., Lazos, L., Kozma Jr., W.: AMD: audit-based misbehavior detection in wireless ad hoc networks. IEEE Trans. Mob. Comput. 15(8), 1893–1907 (2016)CrossRef Zhang, Y., Lazos, L., Kozma Jr., W.: AMD: audit-based misbehavior detection in wireless ad hoc networks. IEEE Trans. Mob. Comput. 15(8), 1893–1907 (2016)CrossRef
16.
Zurück zum Zitat Cai, C., Cai, Y., Zhou, X., Yang, W., Yang, Wendong: When does relay transmission give a more secure connection in wireless ad hoc networks? IEEE Trans. Inf. Forensics Secur. 9(4), 624–632 (2014)CrossRef Cai, C., Cai, Y., Zhou, X., Yang, W., Yang, Wendong: When does relay transmission give a more secure connection in wireless ad hoc networks? IEEE Trans. Inf. Forensics Secur. 9(4), 624–632 (2014)CrossRef
17.
Zurück zum Zitat Zuo, J., Dong, C., Ng, S.X.: Cross-layer aided energy-efficient routing design for ad hoc networks. IEEE Commun. Surv. Tutor. 17(3), 1214–1237 (2015)CrossRef Zuo, J., Dong, C., Ng, S.X.: Cross-layer aided energy-efficient routing design for ad hoc networks. IEEE Commun. Surv. Tutor. 17(3), 1214–1237 (2015)CrossRef
18.
Zurück zum Zitat Madan, R., Mehta, N.B., Molisch, A.F., Zhang, J.: Energy-efficient decentralized cooperative routing in wireless networks. IEEE Trans. Autom. Control 54(3), 512–527 (2009)MathSciNetCrossRef Madan, R., Mehta, N.B., Molisch, A.F., Zhang, J.: Energy-efficient decentralized cooperative routing in wireless networks. IEEE Trans. Autom. Control 54(3), 512–527 (2009)MathSciNetCrossRef
19.
Zurück zum Zitat Anand, A., Aggarwal, H., Rani, Rinkle: Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. J. Commun. Netw. 18(6), 938–947 (2016)CrossRef Anand, A., Aggarwal, H., Rani, Rinkle: Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. J. Commun. Netw. 18(6), 938–947 (2016)CrossRef
20.
Zurück zum Zitat Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst. J. 11(2), 449–459 (2017)MathSciNetCrossRef Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst. J. 11(2), 449–459 (2017)MathSciNetCrossRef
21.
Zurück zum Zitat Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, Asaf: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mob. Comput. 16(8), 2174–2183 (2017)CrossRef Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, Asaf: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mob. Comput. 16(8), 2174–2183 (2017)CrossRef
Metadaten
Titel
Continuous authentication consoles in mobile ad hoc network (MANET)
verfasst von
D. Ramkumar
C. Annadurai
K. Nirmaladevi
Publikationsdatum
24.11.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 4/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1386-2

Weitere Artikel der Sonderheft 4/2019

Cluster Computing 4/2019 Zur Ausgabe