International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 7 384 391 _______________________________________________________________________________________________ 384 IJRITCC | July 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Biometric Based Intrusion Detection System using Dempster-Shafer Theory for Mobile Ad hoc Network Security 1 Dr. Ramalingam M., 2 Dr. Prabhusundhar P, 3 Dr. Thiagarasu V 1,2 Assistant Professors in Computer Science 3 Associate Professor in Computer Science Gobi Arts & Science College (Autonomous) Gobichettipalayam, T.N India ramsgobi@gmail.com, drprabhusundhar@gmail.com AbstractIn wireless mobile ad hoc network, mainly, two approaches are followed to protect the security such as prevention-based approaches and detection-based approaches. A Mobile Ad hoc Network (MANET) is a collection of autonomous wireless mobile nodes forming temporary network to interchange data (data packets) without using any fixed topology or centralized administration. In this dynamic network, each node changes its geographical position and acts as a router for forwarding packets to the other node. Current MANETs are basically vulnerable to different types of attacks. The multimodal biometric technology gives possible resolves for continuous user authentication and vulnerability in high security mobile ad hoc networks (MANETs). Dempster’s rule for combination gives a numerical method for combining multiple pieces of data from unreliable observers. This paper studies biometric authentication and intrusion detection system with data fusion using Dempster Shafer theory in such MANETs. Multimodal biometric technologies are arrayed to work with intrusion detection to improve the limitations of unimodal biometric technique. Keywords- Mobile Ad hoc network, DempsterShafer theory, Intrusion Detection System. __________________________________________________*****_________________________________________________ I. INTRODUCTION This paper is concerned with the study and analysis of biometric-based security for mobile ad hoc network to progress the security in order to decrease the network attacks and leakage of information. With the propagation of inexpensive, smaller and more powerful mobile devices, mobile ad hoc networks (MANETs) have become one of the wildest growing areas of research and it becomes a popular research subject due to their self-configuration and self- maintenance capabilities. Wireless nodes can initiate a dynamic network without a static infrastructure. This type of network is very useful in tactical operations where there is no communication setup. However, security is a major concern for providing reliable communications in a potentially hostile situation. This new type of self- organizing network combines wireless communication with a high degree node mobility. Unlike, conventional wired networks mobile ad hoc networks don’t have fixed structure (base stations, centralized management points and the like). The union of nodes forms an arbitrary topology. This malleable nature makes them attractive for many applications such as military applications, where the network topology may change rapidly to reflect a force’s operational movements and disaster recovery operations, where the existing/fixed infrastructure may be non- operational. The ad hoc self-organization also makes them suitable for virtual conferences, where setting up a traditional network infrastructure is a time consuming high- cost task. Basic functions like packet forwarding, routing and network management are accomplished by the dedicated nodes in the conventional networks. In ad hoc networks these are carried out collaboratively by all available nodes. Nodes on MANETs use multi-hop communication: nodes within the radio range can communicate directly via wireless links, meanwhile nodes which are far must rely on intermediate nodes to act as routers to relay messages. Mobile nodes can move, leave and join the network and routes are need to be updated frequently due to the dynamic network topology. II. MANET SECURITY Because of MANET’s special characteristics, there are some important metrics in MANET security that are important in all security approaches; call them ―Security Parameters‖. Being unaware of these parameters may cause a security approach useless in MANET. Figure 1. shows the relation between security parameters and security challenges. Each security approach must be aware of security parameters as shown in Figure 1. All mechanisms proposed for security aspects, must be aware of these parameters otherwise they may be useless in MANET. Security parameters in MANET are as follows: