Open Access   Article Go Back

Detection Mechanism against the Attacks in MANET and Biometric Classification

P. Prabhusundhar1 , B. Srinivasan2 , M. Ramalingam3

  1. Dept. of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam, Tamilnadu, India.
  2. Dept. of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam, Tamilnadu, India.
  3. Dept. of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam, Tamilnadu, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 986-990, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.986990

Online published on May 31, 2018

Copyright © P. Prabhusundhar, B. Srinivasan, M. Ramalingam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Prabhusundhar, B. Srinivasan, M. Ramalingam, “Detection Mechanism against the Attacks in MANET and Biometric Classification,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.986-990, 2018.

MLA Style Citation: P. Prabhusundhar, B. Srinivasan, M. Ramalingam "Detection Mechanism against the Attacks in MANET and Biometric Classification." International Journal of Computer Sciences and Engineering 6.5 (2018): 986-990.

APA Style Citation: P. Prabhusundhar, B. Srinivasan, M. Ramalingam, (2018). Detection Mechanism against the Attacks in MANET and Biometric Classification. International Journal of Computer Sciences and Engineering, 6(5), 986-990.

BibTex Style Citation:
@article{Prabhusundhar_2018,
author = {P. Prabhusundhar, B. Srinivasan, M. Ramalingam},
title = {Detection Mechanism against the Attacks in MANET and Biometric Classification},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {986-990},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2097},
doi = {https://doi.org/10.26438/ijcse/v6i5.986990}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.986990}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2097
TI - Detection Mechanism against the Attacks in MANET and Biometric Classification
T2 - International Journal of Computer Sciences and Engineering
AU - P. Prabhusundhar, B. Srinivasan, M. Ramalingam
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 986-990
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
685 301 downloads 265 downloads
  
  
           

Abstract

Blackhole attack revealing, PCBHA (Prevention of a Co-operative Black Hole Attack) is a reviewed AODV routing protocol that is proposed in order to avert cooperative black holes. First, it runs each authorized user with a default fidelity level and after spreading a RREQ, a source node waits to accept resumed RREPs from the adjoining nodes and then chooses a near node of a greater fidelity level, which exceeds the threshold value, for passing the information packs. The target node will yield an ACK note after getting information packets, and the source node may add 1 to the fidelity level of the adjacent node, upon receiving of an ACK answer. If no ACK reaction is established, 1 is deducted from the fidelity level, which shows a potential black hole node on this route and information packets are released before reaching the end point node.

Key-Words / Index Term

Biometrics, Attacks, Secrecy, MANET

References

[1] Ashish Mishra., [2010], “Multimodal Biometrics it is: Need for Future Systems”, International Journal of Computer Applications, Vol. 3, No.4, pp. 28 – 33.
[2] Aureli Soria-Frisch, Alejandro Riera and Stephen Dunne., [2010], “Fusion Operators for Multi-modal BiometricAuthentication Based On Physiological Signals”, 978-1-4244-8126-2/10/$26.00 ©2010 IEEE.
[3] Bahgat S F, Ghoniemy S, and Alotabi M., [2013], “Proposed Multimodal palm-veins- face Biometric Authentication”, International journal of advanced computer science and applications, Vol.4, No. 6.
[4] Besbes F, Trichili H and Solaiman B., [2008], “Multimodal Biometric System Based on Fingerprint Identification and Iris Recognition”, in the Proceedings of 3rd Int. IEEE Conf. Inf. Commun. Technol.: From Theory to Applications (ICTTA 2008), DOI: 10.1109/ICTTA.2008.4530129, pp. 1 – 5.
[5] Biometric Data Interchange Formats—Part 6: Iris Image Data, ISO/IEC, 19794-6, Mar. 2004, draft Version, [Online].
[6] Ramalingam M and Thiagarasu V., [2014], “Cluster Based Stretch and Shrink Method for Manet Using Load Balancing, Nearest Neighbor and Rule Mining”, International Journal of Engineering Sciences & Research Technology.
[7] Bo Yang, Ryo Yamamoto and Yoshiaki Tanaka., [2013], “Dempster-Shafer Evidence Theory Based Trust Management Strategy against Cooperative Black Hole Attacks and Gray Hole Attacks in MANETs”, ICACT Transactions on Advanced Communications Technology(TACT), Vol. 2(3), pp. 223 – 232, May, 2013.
[8] Ramalingam M., Prabhusundhar P, Thiagarasu V, “Biometric Based Intrusion Detection System using Dempster-Shafer Theory for Mobile Ad hoc Network Security”, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7, pp. 384 – 391, June-2017.
[9] Ramalingam M and Thiagarasu V., [2014], “Cluster Based Stretch and Shrink Method for Manet Using Load Balancing, Nearest Neighbor and Rule Mining”, International Journal of Engineering Sciences & Research Technology, 3(10.): October, 2014, ISSN: 2277-9655.
[10] Bolle. R., [1999], “System and Methods for Determining the Quality of Fingerprint Images”, United States patent number US596356.
[11] Lim. E, Jiang. X and Yau. W., [2002], “Fingerprint Quality and Validity Analysis”, in the proceedings of IEEE International Conference on Image Processing (ICIP ’02), pp. 469 –472.
[12] M. Ramalingam, V Thiagarasu, “Routing and Broadcasting in MANET: A comprehensive Analysis based on, Routing technique, Clustering and Architectural Model”, International Journal of Engineering Sciences & Research Technology, ISSN: 2277-9655, IJESRT 3 (11), November 2014.
[13] Lingxuan Hu D. E, [2005], “Using Directional Antennas to Prevent Wormhole Attack”, 2005.