Cluster Computing

, Volume 22, Supplement 4, pp 7777–7786 | Cite as

Continuous authentication consoles in mobile ad hoc network (MANET)

  • D. RamkumarEmail author
  • C. Annadurai
  • K. Nirmaladevi


Security in mobile ad-hoc networks (MANETs) is a key issue to be addressed. There are two separate approaches for security in MANETs viz., continuous authentication and intrusion detection. Previous studies in this regard involved a study of the two classes of issues separately. In this work these two classes of security approaches are integrated and combined into a single console. Continuous authentication acts as the first line of defense while intrusion detection system acts as the second. In this framework, biometric authentication is used for continuous authentication. The intrusion detection system has a detection engine and a response engine. The detection engine detects the malicious intruder and the response engine completely eliminates the above detected intruder from the network. The analysis of the security issues is simulated to produce the necessary results.


MANET Intrusion detection systems (IDS) Continuous authentication (CA) Security 


  1. 1.
    Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6, 46–55 (1999)CrossRefGoogle Scholar
  2. 2.
    Yang, H., Luo, H., Ye, F., et al.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRefGoogle Scholar
  3. 3.
    Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-Hoc Networks. Lecture Notes in Computer Science, vol. 2288, pp. 341–354. Springer, Berlin (2001)zbMATHGoogle Scholar
  4. 4.
    Xiao, Q.: A biometric authentication approach for high security ad-hoc networks. In: Proceeding of IEEE Information Assurance Workshop, West Point, NY (2004)Google Scholar
  5. 5.
    Ross, A., Jain, A.K.: Multimodal biometrics: an overview. In: Proceeding of 12th European Signal Processing Conference, Vienna, Austria (2004)Google Scholar
  6. 6.
    Muncaster, J., Turk, M.: Continuous multimodal authentication using dynamic Bayesian networks. In: Proceeding of 2nd Workshop on Multimodal User Authentication, Toulouse, France (2006)Google Scholar
  7. 7.
    Zhang, Y., Lee, W., Huang, Y.: Intrusion detection techniques for mobile wireless networks. Mob. Netw. Appl. 9(5), 45–56 (2003)Google Scholar
  8. 8.
    Ren, K., Lou, W., Kim, K., Fang, Y.: A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Trans. Veh. Technol. 55(4), 1373–1384 (2006)CrossRefGoogle Scholar
  9. 9.
    Kaushik, R., Singhai, J.: Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network. IET Netw. 4(2), 148–157 (2015)CrossRefGoogle Scholar
  10. 10.
    Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, Peter: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)CrossRefGoogle Scholar
  11. 11.
    Marchang, N., Datta, R., Das, S.K.: A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Trans. Veh. Technol. 66(2), 1684–1695 (2017)CrossRefGoogle Scholar
  12. 12.
    Kontik, M., Ergen, S.C.: Distributed medium access control protocol for successive interference cancellation-based wireless ad hoc networks. IEEE Commun. Lett. 21(2), 354–357 (2017)CrossRefGoogle Scholar
  13. 13.
    Kulathumani, V., Arora, A., Sridharan, M., Parker, K., Lemon, Bryan: On the repair time scaling wall for MANETs. IEEE Commun. Lett. 20(8), 1623–26 (2016)CrossRefGoogle Scholar
  14. 14.
    Kang, Myung Gil, Kim, Young-bin, Lee, Jung Hoon, Choi, Wan: Secrecy capacity scaling by jamming-aided hierarchical cooperation in ad hoc networks. IEEE J. Sel. Top. Signal Process. 10(8), 1390–1403 (2016)CrossRefGoogle Scholar
  15. 15.
    Zhang, Y., Lazos, L., Kozma Jr., W.: AMD: audit-based misbehavior detection in wireless ad hoc networks. IEEE Trans. Mob. Comput. 15(8), 1893–1907 (2016)CrossRefGoogle Scholar
  16. 16.
    Cai, C., Cai, Y., Zhou, X., Yang, W., Yang, Wendong: When does relay transmission give a more secure connection in wireless ad hoc networks? IEEE Trans. Inf. Forensics Secur. 9(4), 624–632 (2014)CrossRefGoogle Scholar
  17. 17.
    Zuo, J., Dong, C., Ng, S.X.: Cross-layer aided energy-efficient routing design for ad hoc networks. IEEE Commun. Surv. Tutor. 17(3), 1214–1237 (2015)CrossRefGoogle Scholar
  18. 18.
    Madan, R., Mehta, N.B., Molisch, A.F., Zhang, J.: Energy-efficient decentralized cooperative routing in wireless networks. IEEE Trans. Autom. Control 54(3), 512–527 (2009)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Anand, A., Aggarwal, H., Rani, Rinkle: Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks. J. Commun. Netw. 18(6), 938–947 (2016)CrossRefGoogle Scholar
  20. 20.
    Chen, H.-C.: TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst. J. 11(2), 449–459 (2017)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Schweitzer, N., Stulman, A., Margalit, R.D., Shabtai, Asaf: Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans. Mob. Comput. 16(8), 2174–2183 (2017)CrossRefGoogle Scholar
  22. 22.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of ECESSN College of EngineeringChennaiIndia
  2. 2.Department of CSEKongu Engineering CollegePerunduraiIndia

Personalised recommendations