Iris Signature Methodology for Securing MANET

Issue: Vol.8 No.1

Authors:

Sherin Zafar (Jamia Hamdard University, New Delhi)

M.K. Soni (Manav Rachna International University, Faridabad)

M.M.S. Beg (Zakir Hussain College of Engineering, Aligarh Muslim University, Aligarh)

Keywords: ISM; image procurement and biometric perception system; elliptic curve cryptography

Abstract:

This paper presents a novel Iris Signature Methodology (ISM) to utilizing iris as a biometric mechanism along with elliptic curve cryptography to procure security in networks. The ISM approach is developed in MATLAB that takes into consideration a standardized database for analysis. Biometric percipience is contemplated to be the most neoteric technology for sustaining security in various vulnerable networks like mobile ad-hoc networks (MANET) by implicating exclusive identification features through attainment of biometric perception that depends upon image procurement (IP) and biometric perception system (BPS). Security of MANET is considered as the most important task for better performance improvement hence along with strong biometric feature like iris further enhancement is done in the underlying approach by fabricating an iris signature utilizing features of elliptic curve cryptography. IP and BPS is
attained by an effective exploitation of bi-orthogonal lazy wavelets to conceal biometric information.

References:

[1] Abhyankar, A. and Schuckers, S., 2010. Wavelet Based Iris Recognition for Robust Biometric System. International Journal of Computer Theory and Engineering, 2 (2).[Accessed April 2010].

[2] Boles, W.W. and Boashash, B., 1998. A Human Identification Technique using Images of the Iris and Wavelet Transform. IEEE Transactions on Signal Processing, 46 (4).

[3] Calderbank, A.R. Daubechies, I.,Sweldens, W. andYeoB.L., 1998. Wavelet Transforms that Map Integers to Integers. Applied and Computation Harmonic Analysis (3), 332-369.

[4] Daubechies, I. and Sweldens, W., 1998. Factoring Wavelet Transforms into Lifting Steps. Journal of Fourier Analysis and Applications, 4 (3), 245-267.

[5] Daugman,J., 1994. Biometric Personal Identification System Based on Iris Analysis, United States Patent, 5291560.

[6] Lim, S., Lee, K., Byeon, O. and Kim. T., 2001. Efficient Iris Recognition through Improvement of Feature Vector and Classifier. ETRI Journal, 23 (2).

[7] Lim, S., Yu, C. and Das, C., 2005. A Randomized Communication Scheme for Improving Energy Efficiency in Mobile Ad-hoc Networks. Proceedings of 25th International Conference on Distributed Computing Systems (ICDCS), 123-132.

[8] Masek, L., 2003. Recognition of Human Iris Patterns for Biometric Identification. University of Western Australia. Cheng, H., 2010. Genetic Algorithms with Immigrants Schemes for Dynamic MulticastProblems in Mobile Ad-hoc Networks. Engineering Applications of Artificial Intelligence Elsevier, 806-819.

[9] Panganiban,A., Linsangan,N. and Caluyo,F., 2011. WaveletBased Feature Extraction Algorithm for an Iris Recognition System. Journal of Information Processing Systems, 7 (3). [Accessed September 2011].

[10] Ritter, N., 1999. Location of the Pupil-Iris Border in SlitLamp Images of the Cornea.In:Proceedings of the International Conference on Image Analysis and Processing. IEEE International Symposium on Signal
Processing and Information Technology.

[11] Struc,V., Gajsek,R. and Pavasic,N., 2009. Principal Gabor Filters for Face Recognition 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems, 1-6. [Accessed September 2009].

[12] Sweldens, W., 1995. The Lifting Scheme: A New Philosophy in Bi-Orthogonal Wavelet Constructions.
Wavelet Applications in Signal and Image Processing III, SPIE 2569, 68-79.

[13] Sweldens, W., 1997. The Lifting Scheme: A Construction of Second Generation Wavelets. SIAM Journal of Math Analysis, 29 (2), 511-546.

[14] Wildes, R., 1997. Iris Recognition: An Emerging Biometric Technology. In:Proceedings of the IEEE, 85 (9).

[15] Wildes, R.P., Asmuth, J.C., Green, G.L. and Hsu, H.C., 1994. A System for Automated Iris Recognition. In: Proceedings IEEE Workshop on Applications of Computer Vision, 121-128.

[16] Yanchao, Z., Wenjing, L., Wei, L. and Yuguang, F., 2007. A Secure Incentive Protocol for Mobile Ad-hoc Networks. Conference on WINET, 13 (5). [Accessed October 2007].

[17] Yang, H., Luo, H., Ye, F. and Lu, S., 2004. Security in Mobile Ad-Hoc Networks: Challenges and Solutions. IEEE Transactions on Wireless Communications, 98-102. [Accessed February 2004].

[18] Yen,Y.S. et al., 2008. A Genetic Algorithm for EnergyEfficient Based Multicast Routing on MANET. Conference on Computer Communications, 2632-2641.

[19] Yujun, L. and Lincheg, H., 2010. The Research on an AODV-BRL to Increase Reliability and Reduce Routing Overhead in MANET. In: Proceedings of International Conference on Computer Application and System Modelling (ICCASM), 12, 512-530.[Accessed October 2010].

[20] Zafar Sherin, Soni.M.K., Beg M.M.S 2015. An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET. Procedia Computer ScienceVolume 62, 2015, Pages 410–418 (Elsevier)Proceedings of the 2015 International Conference on Soft Computing and Software Engineering (SCSE’15).

[21] Zafar Sherin, Soni.M.K. 2014. Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm . I.J. Modern Education and Computer Science, 28-35.

[22] Zafar Sherin, Soni.M.K. 2014. A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET. Genetic Algorithm . I.J. Computer Network and Information Security, 64-71.

[23] Zafar Sherin, Soni.M.K. 2014. Secure Routing in MANET through Crypt-Biometric Technique. Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA),713-720.

[24] Zafar Sherin, Soni.M.K., Beg M.M.S 2015. QOS Optimization in Networks through Meta-heuristic
Quartered Genetic Approach. ICSCTI,IEEE.