[PDF][PDF] A PROPOSED APPROACH FOR THE PREVENTION OF BLACK HOLE USING FINGER PRINT AUTHENTICATION AND GENETIC ALGORITHM OPTIMIZATION …

P Chandel, R Kumar - International Journal of Advanced …, 2018 - pdfs.semanticscholar.org
The Internet is a communication network where two or more than two users communicate
and exchange the data. When two or more than two different areas combine together to …

Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization

R Kumar - International Journal of Computer Network and …, 2018 - mecs-press.org
The Internet is a communication network where two or more than two users communicate
and exchange the data. Black hole attack is a security threat in which a malicious node …

A Study of Internet Threats, Avoidance and Biometric Security Techniques-Comparison of Biometric Techniques

MJ Arshad, AI Durrani, UG Khan… - … OF FACULTY OF …, 2014 - journals.pu.edu.pk
In today's IT world, most of the communication is done through networking. So, security of
information is very crucial. A lot of techniques have been developed for security which …

An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET

R Chakravorty, J Prakash, A Srivastava - Soft Computing, 2024 - Springer
Today, more than ever, the necessity for remote availability, independent of a client's
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …

[PDF][PDF] Application of fingerprint security technique in UBIQUITOUS learning system

A Afolabi, ER Adagunodo - Int. J. Eng. Res. Technol, 2014 - academia.edu
Ubiquitous learning system is a kind of learning system in which the student (s) can access
information and learn anytime, any day and anytime, without necessarily being with the tutor …

[PDF][PDF] Detection of Fingerprints in Advanced Biometric System Design

PK Lakkoju, TN Shankar - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
The objective of this research is to incorporate fingerprint authentication to thwart the
intruders attack in a network. A complete feature extraction process to propose an …

[PDF][PDF] Biometrics authentication technique for intrusion detection systems using fingerprint recognition

SS Mudholkar, PM Shende, MV Sarode - International Journal of …, 2012 - Citeseer
Identifying attackers is a major apprehension to both organizations and governments.
Recently, the most used applications for prevention or detection of attacks are intrusion …

[PDF][PDF] Designing of a Virtual System with Fingerprint Security by considering many Security threats

K Saini, ML Dewal - International Journal of Computer …, 2010 - researchgate.net
In these days there is a requirement of reliable security system for process industry, in
banks, homes etc. We have taken one of the Biometric modality ie fingerprints for this …

Fingerprint recognition based on biometric cryptosystem

J Valisireddy, G Anjaneyulu… - Journal of Integrated …, 2024 - pubs.thesciencein.org
In this article, we design a new Biometric Cryptosystem based on finger print recognition. In
this Cryptosystem the algorithm is based on Eigen space approach. This approach has been …

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …