Type of Material: | Thesis |
Title: | Multimodal Biometric security in Mobile Adhoc Networks and its Application |
Researcher: | Deny, J |
Guide: | SUNDHARARAJAN, M |
Department: | Department of Electronics and Communication Engineering |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2017 |
Language: | English |
Subject: | Engineering | Engineering and Technology | Engineering Electrical and Electronic | Electronics and Communication Engineering | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2017; D13EC501 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454814 | |
003 | IN-AhILN | |
005 | 2024-09-19 11:28:30 | |
008 | __ | 240919t2017||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454814 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aDeny, J|eResearcher |
110 | __ | |aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446 |
245 | __ | |aMultimodal Biometric security in Mobile Adhoc Networks and its Application |
260 | __ | |aChennai|bBharath University, Chennai|c2017 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2017|oD13EC501 |
520 | __ | |aMultimodal biometric technology provides potential solutions for continuous user-todevice authentication in high security mobile ad hoc networks. Continuous user authentication is an important prevention-based approach to protect high security mobile ad hoc networks (MANETs).Intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. This study presents a framework of combining authentication and intrusion detection in MANET. This study presents three authentication methods to choose the optimal scheme of combining authentication and intrusion detection. The first method uses the dynamic programming-based hidden Markov model scheduling algorithms to derive the optimal schemes. The second technique uses the Dumpster Shafer theory for data fusion. The system decides whether user authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. Third technique presents structural results method to solv |
650 | __ | |aElectronics and Communication Engineering|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aEngineering |
653 | __ | |aEngineering and Technology |
653 | __ | |aEngineering Electrical and Electronic |
700 | __ | |aSUNDHARARAJAN, M|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/321471|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.