Title : Multimodal Biometric security in Mobile Adhoc Networks and its Application

Type of Material: Thesis
Title: Multimodal Biometric security in Mobile Adhoc Networks and its Application
Researcher: Deny, J
Guide: SUNDHARARAJAN, M
Department: Department of Electronics and Communication Engineering
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2017
Language: English
Subject: Engineering
Engineering and Technology
Engineering Electrical and Electronic
Electronics and Communication Engineering
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2017; D13EC501
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454814
003IN-AhILN
0052024-09-19 11:28:30
008__240919t2017||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454814
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aDeny, J|eResearcher
110__|aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aMultimodal Biometric security in Mobile Adhoc Networks and its Application
260__|aChennai|bBharath University, Chennai|c2017
300__|dDVD
502__|bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2017|oD13EC501
520__|aMultimodal biometric technology provides potential solutions for continuous user-todevice authentication in high security mobile ad hoc networks. Continuous user authentication is an important prevention-based approach to protect high security mobile ad hoc networks (MANETs).Intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. This study presents a framework of combining authentication and intrusion detection in MANET. This study presents three authentication methods to choose the optimal scheme of combining authentication and intrusion detection. The first method uses the dynamic programming-based hidden Markov model scheduling algorithms to derive the optimal schemes. The second technique uses the Dumpster Shafer theory for data fusion. The system decides whether user authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. Third technique presents structural results method to solv
650__|aElectronics and Communication Engineering|2UGC
650__|aEngineering and Technology|2AIU
653__|aEngineering
653__|aEngineering and Technology
653__|aEngineering Electrical and Electronic
700__|aSUNDHARARAJAN, M|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/321471|yShodhganga
905__|afromsg

User Feedback Comes Under This section.