Open Access Open Access  Restricted Access Subscription Access

A Biometric Identification System based on the Fusion of Palm print and Speech Signal


Affiliations
1 Department of Computer Science and engineering, Bharath University, Chennai - 600073, Tamil Nadu, India
 

Mobile Adhoc Network is an autonomous network formed by creating nodes and establishing wireless connections dynamically, so that messages in packets can be sent from a sender to receiver. The unique architecture of MANET offers several advantages and security challenges as passive and active attacks on the network. We discuss elaborately about the security attacks and two more popular security techniques, Intrusion Detection System (IDS) and Watchdog and Path rater (WPR). The two techniques are evaluated using two measures, viz., Availability Factor (AF) and Integrity Factor (IF). We present our results and our insights on suitability of a particular technique to a specific networking application. Our research is on-going and we indicate the extension possibilities that we are working upon.

Keywords

Availability and Integrity, Decentralized Management, Dynamic Routing, Intrusion Detection, Malicious Node, Prevention
User

Abstract Views: 354

PDF Views: 0




  • A Biometric Identification System based on the Fusion of Palm print and Speech Signal

Abstract Views: 354  |  PDF Views: 0

Authors

N. Priya
Department of Computer Science and engineering, Bharath University, Chennai - 600073, Tamil Nadu, India

Abstract


Mobile Adhoc Network is an autonomous network formed by creating nodes and establishing wireless connections dynamically, so that messages in packets can be sent from a sender to receiver. The unique architecture of MANET offers several advantages and security challenges as passive and active attacks on the network. We discuss elaborately about the security attacks and two more popular security techniques, Intrusion Detection System (IDS) and Watchdog and Path rater (WPR). The two techniques are evaluated using two measures, viz., Availability Factor (AF) and Integrity Factor (IF). We present our results and our insights on suitability of a particular technique to a specific networking application. Our research is on-going and we indicate the extension possibilities that we are working upon.

Keywords


Availability and Integrity, Decentralized Management, Dynamic Routing, Intrusion Detection, Malicious Node, Prevention



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i31%2F135463