B. Shanthini, Research Scholar
S. Swamynathan, AssistantProfessor
—A mobile ad hoc network (MANET) is a self configuring, dynamic, multi hop radio network without any fixed infrastructure. MANETs are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. The main challenge in the design of such networks is how to prevent the attacks against data such as unauthorized data modification, impersonation etc. Biometrics provides possible solutions for this security problem in MANET since it has the direct connection with user identity and needs little user interruption.So, researchers have been investigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce tough and repeatable cryptographic keys. In this paper such a security system based on Biometrics and Genetic algorithm which is providing data security in MANET is presented.
I.INTRODUCTION Mobile ad hoc networks are seen as autonomous that can be quickly formed, on demand, for specific tasks and mission support. Communication generally happens through wireless links, in which nodes within a radio range communicate and coordinate to create a virtual and temporary communication infrastructure for data routing and data transmission. MANET can operate in isolation or in coordination with a wired network through a gateway node participating in both networks. This flexibility along with their self-organizing capabilities, are someof their biggest strengths, as well as their biggest security weaknesses. The applications of MANET include the foremost situations such as emergency/crisis management, military, healthcare, disaster relief operations and intelligent transportation systems. So message security plays a vital role in data transmission in MANET. However, because of the absence of an established infrastructure or centralized administration,implementation of hard-cryptographic algorithms is a challenging prospect. So, in this paper, we present a novel security method using genetic based biometric cryptography for message security in mobile ad hoc networks.
A.Security challenges in MANET
Wireless ad hoc networks are vulnerable tovariousattacks . Adversaries may attempt passive and active attacks to gain unauthorized access to classified information, modify the information, delete the information or disrupt the information flow. The best way to protect data information in a most fine- granular way is by providing security at theapplication layer. It is highly desirable to handle data confidentiality and integrity in applicationlayer, since this is the easiest way to protect data from altering, fabrication and compromise. With the rapid evolution of wireless technology the reliance of ad hoc networks to carry mission critical information is rapidly growing. This is especially important in a military scenario where strategic and tactical information is sent.Therefore the ability to achieve a highly secure authentication is becoming more critical. Numerous countermeasuressuch as strong authentication, encrypting and decrypting the messages using traditional cryptographic algorithms and redundant transmissioncan be used to tackle these attacks. Even though these traditional approaches play an important role in achieving confidentiality, integrity, authentication and non-repudiation, these are not sufficient for more sensitive and mission-critical applications and they can address only a subset of the threats. Moreover, MANETs cannot support complex computations or high communication overhead due to the limited memory and limited computation power of mobile nodes.
B.Necessity of BiometricsSecurity
For mission-critical applications such as a military application may have higher requirements regarding data or information security. In such a scenario, we may design the security system combining both biometrics and cryptography. Biometric based security scheme overcome the limitations of traditional security solutions. Biometricsrefers to the methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits like fingerprints, iris, retina scans, hand, face, ear geometry, hand vein, nail bed, DNA, palm print, signature, voice, keystroke or mouse dynamics, and gait analysis etc.
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 6, September 2010149http://sites.google.com/site/ijcsis/ISSN 1947-5500