Skip to main content
Log in

A secured optimised AOMDV routing protocol in MANET using lightweight continuous multimodal biometric authentication

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Mobile ad hoc networks (MANETs) is a very popular research area due to their wide application and ease of deployment. Due to the inherent nature of MANET and the lack of any centralized security mechanism, it is vulnerable to a number of network security attacks. Sybil attack is one of the security threats that paves the way for many other attacks by hiding the presence of malicious nodes in the network. It also affects the routing performance and security by creating a disturbance in the routing mechanism. The authentication process confirms the genuineness of the user’s identity and further ensures that the resources are accessed by genuine users only. The systems of biometric identification are now becoming very popular and have also been researched widely in recent times. Using a combination of either two or more biometric modalities in a system for verification or identification is an emerging trend. Also, continuous biometric authentication is gaining more importance as the user is monitored for legitimate throughout the session and can report any attacker found. Palmprint and fingerprint are the two biometrics used for authentication in the present work. The ad-hoc on-demand multipath distance vector (AOMDV) based protocol of routing will compute multiple loop-free paths for every route discovery in MANETs. To improve the efficiency of the routing, heuristic methods are applied. In this work, this flower pollination algorithm has been proposed along with the AOMDV and Biometrics for continuous authentication for Sybil attack detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Abdel-Basset M, Shawky LA (2018) Flower pollination algorithm: a comprehensive review. Artif Intell Rev 52:2533–2557

    Article  Google Scholar 

  • Banerjee B, Neogy S (2021) A brief overview of security attacks and protocols in MANET. In: 2021 IEEE 18th India council international conference (INDICON), Guwahati, India, 2021 Dec 19. IEEE, pp 1–6

  • Bhartiya N, Jangid N, Jannu S (2018) Biometric authentication systems: security concerns and solutions. In: 2018 3rd International conference for convergence in technology (I2CT), Pune, India. IEEE, pp 1–6

  • Daugman J (1988) Complete discrete 2-D Gabor transforms by neural network for image analysis and compression. IEEE Trans Acoust Speech Signal Process 36:1169–1179

    Article  Google Scholar 

  • Deny J, Sundhararajan M (2015) Multi modal biometric security for MANET military application-face and fingerprint. J Comput Theor Nanosci 12(12):5949–5953

    Article  Google Scholar 

  • Ellen Funderburg L, Lee I-Y (2021) A privacy-preserving key management scheme with support for Sybil attack detection in VANETs. Sensors 21:1063

    Article  Google Scholar 

  • Gálvez J, Cuevas E, Avalos O (2017) Flower pollination algorithm for multimodal optimization. Int J Comput Intell Syst 10(1):627–646

    Article  Google Scholar 

  • Giełczyk A, Choraś M, Kozik R (2019) Lightweight verification schema for image-based palmprint biometric systems. Mob Inf Syst 2019:2325891

    Google Scholar 

  • Joseph T, Kalaiselvan SA, Aswathy SU, Radhakrishnan R, Shamna AR (2021) A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. J Ambient Intell Humaniz Comput 12(6):6141–6149

    Article  Google Scholar 

  • Kaur H (2017) Energy efficiency in AODV using flower pollination algorithm. Int J Eng Res Technol 6(03):1–7

    Google Scholar 

  • Marina MK, Das SR (2001) On-demand multipath distance vector routing in ad hoc networks. In: Proceedings ninth international conference on network protocols. ICNP 2001, Riverside, CA, USA, pp 14–23

  • Muthusamy P, Sheela T (2018) Sybil attack detection based on authentication process using digital security certificate procedure for data transmission in MANET. Int J Eng Technol 7(3.27):270–276

    Article  Google Scholar 

  • Quy VK, Nam VH, Linh DM, Ban NT, Han ND (2021) A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wirel Personal Commun 120(1):49–62

    Article  Google Scholar 

  • Richard YuF, Tang H, Leung VC, Liu J, Lung CH (2008) Biometric-based user authentication in mobile ad hoc networks. Secur Commun Netw 1(1):5–16

    Article  Google Scholar 

  • Ryu R, Yeom S, Kim SH, Herbert D (2021) Continuous multimodal biometric authentication schemes: a systematic review. IEEE Access 9:34541–34557

    Article  Google Scholar 

  • Sajjad M, Khan S, Hussain T, Muhammad K, Sangaiah AK, Castiglione A et al (2019) CNN-based anti-spoofing two-tier multi-factor authentication system. Pattern Recognit Lett 126:123–131

    Article  Google Scholar 

  • Shanmugasundaram K (2020) Hybrid improved bacterial swarm optimization algorithm for hand-based multimodal biometric authentication system. J Inf Commun Technol 18(2):123–141

    Google Scholar 

  • Shrivastava S, Agrawal C, Jain A (2015) An IDS scheme against black hole attack to secure AOMDV routing in MANET. arXiv preprint. arXiv:1502.04801

  • Simpson SV, Nagarajan G (2022) Security challenges and attacks in MANET-IoT systems. In: Augustine P, Raj P, Munirathinam S (eds) Enterprise digital transformation: technology, tools, and use cases, 2022 Feb 18. CRC Press, Boca Raton, pp 159–201

  • Tang Z, Zhao Y, Yang L, Qi S, Fang D, Chen X, Wang Z (2017) Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mob Inf Syst 2017:1248578

    Google Scholar 

  • Vidwans A, Shrivastava AK, Manoria M (2014) Qos enhancement of AOMDV routing protocol using queue length improvement. In: 2014 Fourth international conference on communication systems and network technologies, Bhopal, India, pp 275–278

  • Zafar S, Soni MK (2014) Sustaining security in MANET: Biometric Stationed Authentication Protocol (BSAP) inculcating meta-heuristic genetic algorithm. Int J Mod Educ Comput Sci 6(9):28

    Article  Google Scholar 

  • Zhou J, Xu H, Qin Z, Peng Y, Lei C (2013) Ad hoc on-demand multipath distance vector routing protocol based on node state. Commun Netw 5(03):408

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. V. Brindha.

Ethics declarations

Conflict of interest

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Brindha, N.V., Meenakshi, V.S. A secured optimised AOMDV routing protocol in MANET using lightweight continuous multimodal biometric authentication. J Ambient Intell Human Comput 14, 16115–16131 (2023). https://doi.org/10.1007/s12652-022-03836-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03836-7

Keywords

Navigation