Documente Academic
Documente Profesional
Documente Cultură
AbstractMobile Ad hoc network (MANET) is at stake since critical information can be revealed by the
becoming the most frequently used network connection biometrics.
type due to the rapid growth of mobile dependency in
todays technology. Its formation and maintenance of As of now, using biometric characteristics as
architecture is self-based making it to have a big authentication key was explored by the researchers, they
advantage. On the other hand, its diversity brings have tried using different encryption algorithms involving
threat to security. The objective of this research is to biometrics. A study on using cancelable non-invertible
provide an encryption algorithm for MANET using fingerprint as the cryptographic key in MANET was done
biometrics with high security but not compromising the by Pravinchandra, et al. In their proposed method, an
accuracy of the data. authentication key was first created to maintain integrity,
then the data to be transmitted is enciphered using the
Keywordscryptography; mobile ad hoc network; cancelable key from the fingerprint of the acceptor, and
biometric; encryption; network security lastly genetic operator was used to provide randomization
for safety in case of attacks. The system that was created
I. INTRODUCTION was proven to overcome hacking techniques like
Ad-hoc networks refer to communication between cryptanalytic and brute force attack. In their model, the
electronic devices without an intermediary device like fingerprint images that they will use for the
router or switch. The most common application of experimentation was placed in a database. The minutiae
temporary network is the Mobile Ad hoc Network points from the fingerprint image were reconstructed to
(MANET), wherein different smart devices configure form cancelable template in order to secure sensitive user-
themselves to form wireless interconnection without a specific data.
predefined infrastructure. The main advantages of MANET
are that its formation and maintenance of architecture is
self-based. Devices are easily added or removed from the
network. On the other hand, it does not have dependable
centralized authority since the network is formed
temporarily; the infrastructure changes continuously every
time there is a communication that is needed to be
established. One of the immense dispute that emerged from
the diversity of MANET is the security. The rapid growth
of mobile dependency in todays technology brings a need
for secure data transmission using MANET. Cryptography
is the process of securing the data to protect it from being
accessed by unauthorized party. Using biometric attributes
is one of the most effective way to generate unique Figure 1. Illustration of Mobile Ad hoc Network
cryptographic key that will protect the sensitive data during
transmission. But using persons biometrics is very crucial The preceding research traded off the accuracy of
since it cant be compromised, the privacy of the person is data over the security of data. Creating cancelable template
involves strong encryption, the image of the fingerprint was
reconstructed making the similarity within the data be enchipher the data. The process of generating the
removed to defeat attacks. At the same time, the similarity authentication code was shown on figure 2. Utilizing public
that was removed was needed in pattern classification and private key trade calculation, private key enchiphered
algorithm to achieve high accuracy. The previous paper vector is decrypted; then from this, the device id is
doesnt also consider the scale of the MANET, their extracted and verification code AU' produced. If it doesn't
devices was only limited to smartphones and laptops. The match with the AU then process is ended as validation and
improvement for Mobile Ad hoc Networks architecture data integrity are violated. On the off chance that match is
was not catered on the paper. discovered then using indexes of random pair and crossover
point the key K is created at the receiver side using
The objective of this research is to provide an cancelable transform. The flowchart in figure 2
encryption algorithm with high security but not demonstrates the processes that the receiving party does
compromising the accuracy of the data. The blind crypto- once they get the authentication code. Symmetric key is
biometric key generation means that any information about created both the side.
the biometrics will not be revealed. A separate trusted
server handles the encryption of parameters for specific
biometrics. It is also the aim to organize a trust
infrastructure for the Mobile Ad hoc Network with rising
availability and better scalability to secure services. A
defined level of protection by securing communication of
nodes and an improved manageability in certification was
also desired on the research.
A. Cancelable Fingerprint
The cancelable fingerprint is generated by repeatedly
distorting of the fingerprint image captured. Mehta
Manisha Pravinchandra analyzed on his paper the
efficiency of using genetic based cancelable non-invertible Figure 2-2. Receiver Side Process
fingerprint for encryption and decryption in MANET. A B. Quantum Cryptography
non-invertible key K was produced when two points in the Based Biometric Encryption
cancelable template cross over genetic point. The
The main idea of cryptography is to facilitate exchange
randomization pair selection indices throughout the
of information in a way that only the intended recipient
cancelable transformation are kept in the vector IV & two
receives it. Anju Rani planned a technique on how to
points of crossover operator are attached to the vector IV.
generate secret key using fingerprint and quantum
The vector IV is encrypted with private key created at the
cryptography. Quantum cryptography uses physics instead
sender side and receiver side, the key K was used to
of math in encryption process. A key and a plain text was message encryption and decryption. Since fingerprint
used together as an input for the encryption algorithm then sample is one of a kind so nobody can get to it.
an attachment was also used as an input to decryption
algorithm. The equation was inscribed as: On the testing part, the BB84 protocol was
comprehended on a noisy environment, it was tested if it
can be identified whether a noise was coming from error or
from eavesdropping. The protocol has two stages:
where P is for plain text, C is for crypto text, k is for
communication over a quantum channel and
cryptographic key, E is for encryption and D is for
communication in four phases over a public channel. The
decryption. This appears, as much as the key is flawlessly
said four phases were the extraction of unused key,
irregular, has the equivalent length as the first message, and
approximation of error in unused key, extraction of
is never reused then the one-time cushion is superbly
reconciled key, and privacy amplification.
secure. It is difficult to build up a secret key with routine
procedures to exchange data from sender to beneficiary or C. Adaptive Security for
the other way around, thus key conveyance has depended Multilevel Adhoc Networks
on the foundation of a physically secure channel ("trusted A research by Tahira Mahboob served as a guide
courier") or the contingent security of "difficult" towards creating and comprehending of reception of
mathematical problems out in the public key cryptography required security for multi-level ad hoc systems.
idea.