A PROPOSED APPROACH FOR THE PREVENTION OF BLACK HOLE USING FINGER PRINT AUTHENTICATION AND GENETIC ALGORITHM OPTIMIZATION

: The Internet is a communication network where two or more than two users communicate and exchange the data. When two or more than two different areas combine together to substantially attain a specific goal then it is referred to as Internet of Things. Adhoc network consists of devices that communicate with each other directly. Black hole attack is a security threat in which a malicious node drops some or all of the packets. Biometric features are used for identification of a person. In this paper, author proposed a framework that implements a biometric authentication system to verify the user and to save the user from any internal or external threat in the communication network. The main objective of this research work is to integrate the biometric security with the communication network. The feature extraction algorithm for the finger print is supposed to be minutiae based feature extraction. If the user is authenticated only then prevention mechanism against black hole is applied using the genetic algorithm. Proposed model’s performance is evaluated using various metrics like delay, throughput, energy consumption and packet delivery ratio.


I. INTRODUCTION
Finger print authentication innovation gives an extraordinary level of security, making it the most effective approach to confirm one's personality besides DNA. For example, Eye Lock's application utilizes video innovation to convey a quick and well-disposed client experience to distinguish more than 240 purposes of interesting attributes in every human finger print. It is very embeddable and suitable for use in numerous business sector areas, including social insurance, money related administrations, stadiums, car, government, and many more. As the Internet of Things keeps on growing from home indoor regulators to complex travel systems, propelled processing plants, interconnected financial systems, the security is progressively imperative [1]. The usage of finger print authentication over these business sectors and parts will include an abnormal state of security as well as keeping frameworks easy and simple to utilize. As biometrics provide enhanced security thus for providing access to a particular device it has become the desired authentication mechanism. As a result, it can be integrated into every facet of life. This technology is now being implemented and can be easily integrated into the network to provide high security in the network. The changing IoT operating environment results in increasing the attack surface area and a threat to the interconnected devices. IoT comprises of different systems having different types of sensors nodes or devices. Technology that is associated with these devices is different at each layer. Devices in IoT are sensed remotely. Devices in the IoT use IPv6 in Internet as address space of IPv4 is limited. IoT devices can be used to monitor health care systems, emergency systems, mechanical & electrical devices, inter and intra vehicular communication, road safety assistance etc [2]. Devices have sensory capabilities and actuation capabilities e.g. locks and lights controlling. As IoT is spreading widely and security industries are well known to various vulnerabilities like as authentication, encryption etc., even then penetration detection and prevention techniques are neglected on these devices. Thus IoT vendors have to perform various security checks before implementing their devices. This helps in mitigating the risk of attacks.

A. Security Threats in Internet of Things
IoT is a network of interrelated physical devices and has the ability to communicate over a network. It greatly affects the way humans live. It can be taken as the step up in Internet technology [3]. The changing IoT operating environment results in increasing the attack surface area and a threat to the interconnected devices. i. IOT Devices Attacks: For some potential attacker, a device is showing the interesting target for different reasons. A number of devices can have an inherent value with their straightforward nature of their function. For example, a security camera when compromised can give some particular information regarding security posture of a known location. ii. Communication Attacks: A very usual method of attack considers altering and monitoring of the messages while communicating. These attacks become more dangerous during traversing of sensitive information, because data and messages may get captured, intercepted and manipulated. The concerned threat puts the data and information that is being transmitted at risk. iii. Master of Devices Attacks: A master must be there for each service or device in IoT. The aim of the master is to manage and issue the devices and facilitate the analysis of data. The attacks against the master, IoT solution providers and cloud service providers can inflict the most amount of harm as they have a large amount of sensitive data.

B. Challenges in Internet of Things
Few doubts to be considered are that the intelligent device is the next technological revolution. With the new conveniences and the miracles, the Internet of things (IoT) also promised to bring new issues and concerns. Some of these issues can be technical, some are social or environmental [4]. Right now, new problems and concerns of the majority received little recognition, although many have begun to emerge: i. Lack of Security: Every user likes to choose the convenience when they have to choose between convenience and safety manufacturers. Devices like satellite receivers, routers, smart TVs and network storage can be simply attacked. Security is considered as the paramount in applications of industrial internet that are built on at-least thousands of sensor nodes which maximize the threat surface by means of magnitude order. Industry Internet components needs maintenance and upgrading of the construction in mind. Industrial systems need to be maintained and continuously modified to meet changing needs.
ii. Lack of Privacy: IOT is considered as the information wealth for one who has the authentication. Tracking of smart phones is possible but the smart devices points to the future where the supplements of government can census the information with the smart devices output. IOT can produce various examples when there are debates on the privacy of the smart device users [5].
iii. Storage issues: The information generated by smart devices for sharing the data can increase the demands of energy needed by IOT. For example Google may have number of server farms that consists of tens of thousands of square feet, can be dwarfed by smart devices demand. Some data generated by smart devices is needed just for sending the signals to other devices and don't need to be stored and some data like device timers needs to be stored for around a week or two. iv. Waste disposal: Because of obsolescence, 50 million tons of e-waste like computers, phones, peripherals are generated every year in US only. In the meantime, less than 20% of the e-waste is being recycled. The smart devices are not exactly originating the e-waste, but they are built in the similar method the computer are. Thus they have less lifespan and can double or triple the problem. v. Energy demands: A few years ago, it was predicted that by 2015, 4.9 billion smart devices will be used and it will increase to 30 percent by 2030. With these boosts, the demand for energy that is comparable to the energy demand produced by Internet would raise. During 2012, data centre has the Internet as estimated for requiring 30 billion watts for power per year. It is sufficient to power small cities, and Things of Internet will require much more. It will be difficult to meet the demand by green energy and enhanced batteries like wind and solar. But adding problems such as wasted energy and pollutants and powering IoT can be an important social issue in the next ten years. vi. Open Standards requirement: Internet of Things has particular devices for their own condition. As not significant at this phase smart devices must be able to communicate with each other for the further growth. However, worldwide standards with protocols are lacking after the smart technology development, although it is likely that much of IoT will be built with open source software. Some existing efforts tends to be limited to technologies like Eclipse Internet of Things and focussed on applying the existing protocols/ standards for smart devices as a substitute of being created for the novel Internet of Things needs. The growth of IOT will be as slow as possible without a greater degree of cooperation. vii. Novel use cases: As numbers of organizations are now developing great IoT value, a number of organizations are still hostile for getting started. For helping the organizations, Internet of Things journey is started, the Internet of Things Value Roadmap is developed, and the guide would help the organizations to create business value in connected and smart world. How to use IoT include a timer that typically turns the appliance on and off, but the real purpose may only appear when smart devices be all over the place [6]. It doesn't imply that Internet of Things would never be a successful skill. But it implies that the outcome is difficult to predict. The only reliable advice is advising everyone to expect the unexpected estimates, and that the suggestions for long-term planning are almost inaccurate.

II. BLACK HOLE ATTACK
In black hole attack, router instead of relaying packets to other nodes, drop some or all of the packets. In this routing protocol is used by a malicious node in order to advertise itself. It is hard to detect black hole attack as packets can also be dropped due to a network problem. If the router drops all the packets, then it is easy to discover the attack but if the router drops some of the packets over a particular period of time then it is difficult to discover black hole attack.
The faulty router broadcasts that it has the smallest way to the receiver's node than any other node. The faulty router does not check its routing table. Thus it sends a reply to the requests quickly before any other node. The requesting node gets a reply from the faulty node before receiving a reply from actual node. Thus forged route is created. After establishing the route, the faulty node will either forward packet to unknown address or drop all the packets. In Fig.1 node "A" sends RREQ packets to node "E" hence route discovery process is initiated. If node "B" is a malicious node then as it receives RREQ packet it sends the reply to node "A" before any other node. Thus node "A" considers it as the active route and initiates transferring the packets to the node "B". Node "A" will refuse all other replies from other actual nodes. Hence entire data packets will be lost [7].

III. FINGERPRINT AUTHENTICATION
The study of the fingerprints came into the moon light in the 18th century. Fingerprint matching is one of the oldest forms of the biometric technologies that are being used so widely. In the field of civilian, criminal investigation, government and commercial device applications like licence card, passport and security device, the fingerprint technology is used. Fingerprints of humans consider being unique and they can never be the identical. iv. Decision-making module: Once matching is done, the machine gives the response that is either true or false. The decision is given by the biometric system that either that ID has matched or not. If it is matched then access to the system is granted else access is denied.
Fingerprints are known to be the fastest and best method for biometric identification. As everyone has individual fingerprints, therefore, it is used securely and doesn't vary anyone's lifetime. The fingerprint execution is cheap and has the best stability. This can be used in forensics as well as civilian purposes and mostly biometric dependent. It consumes less energy as compare to other systems and is even faster too.

IV. RELATED WORK
Ashish et al. [10], proposed a new protocol named as Secure AODV for preventing the effect of black hole attack on the network. It is based on first route reply caching mechanism. In this protocol, to mitigate the black hole attack, the first RREP that is reaching the source node is ignored. The results are measured using various parameters like packet delivery ratio, delay and throughput that show a considerable improvement over existing protocol.

M. Rajesh Babu et al. [11]
, proposed an alleviation procedure to detect the nodes that are behaving abnormally. Sensitive guard procedures, hole detection algorithms and timely mandate procedures are used to detect hostile nodes. The proposed procedure is cost-effective and ensures the guaranteed QoS by assuring resource availability proposed algorithm ensures guaranteed quality of service and costeffectiveness. From the results, authors had concluded that proposed algorithm is better than other solutions for the detection of black hole attack.
Arshdeep et al. [12], implemented genetic algorithm with Black hole attack. In this paper, dynamic source routing protocol is used to prevent system from attack. For simulation, a hypothetical network was constructed and then monitored for a number of parameters.
Ashwini Hosgouda et al. [13], proposed an efficient method to increase the success packet delivery ratio even when black hole is present. The method uses advance BFO algorithm. Java Netbeans IDE is used for black hole attack detection and mitigation and performance are evaluated on the basis of energy consumption and packet delivery ratio.
Rakesh Ranjan et al. [14], reviewed black hole attack. Black Hole attack affects reactive routing protocol that causes a serious loss of data which leads to a security threat. As one of many protocols AODV (Ad hoc Ondemand Distance Vector) is usually an easy victim of such attacks. In this type of attack, the node broadcasts that it has the shortest path to the destination and making it easier to access all of the data transmitted. Such nodes are called malicious nodes. Masao Yamazaki et al. [16], concluded Small Area Sensors Fingerprint authentication as the most promising technology for network user authentication on mobile devices such as smart phones. In this case, the size of the touch sensor becomes so small that the traditional detail method should be replaced by a new method. They consider a scale-invariant feature transform (SIFT) method for fingerprint authentication using a touch sensor on a smart phone. In this article, the main focus was on template extension registries to accept any small portion of the query finger for validation.
Tanvi et al. [17] summarize soft computing techniques in biometrics. In the past few years, biometric verification has become one of the most promising technologies, but still, there are issues in FAR and FRR. Great biometric identification system has a high rate of recognition, tolerance for uncertainty and noise in data. Recently, soft computing is widely used in biometrics, which greatly contributes to enhancing its recognition rate. All kinds of soft computing techniques, such as fuzzy logic, NN are used to build a good biometric system. This paper introduces biometric and its related issues. The variety of soft computing techniques for feature extraction, integration, optimization and recognition rate improvement are described.
Chandeep Singh et al. [18], proposed an adaptive approach based on genetic optimization to determine Blackhole attack in AODV (Adhoc on demand distance vector protocol). The Genetic algorithm is used to increase the performance, availability and efficiency of the network. They had analyzed the performance of GA in AODV protocol during black hole attack and concluded that AODV-GA is better than only AODV.
Gaurav Kumar et al. [19], presented detailed information about various types of feature and feature extraction techniques. A comparison is made between different feature extraction techniques and it helps in taking a quick decision about which extraction techniques are better for a particular type of work.

Harpreet Singh Brar et al. [20]
, presented a unique bacterial foraging optimization method. Minutiae extraction operation and other morphological operations are used to extract features. In this paper, comparisons are made between BFO and SVM (Support vector machines). At last, author concluded that BFO is better than SVM while matching finger prints with angle variations.
Rupak Rathore et al. [21], showed the highlighting of the rapid aging of the population, and obesity-related medical conditions, widely drunk driving incident, advances in medical devices, and 4G mobile networks that makes possible to integrate biometric technology into the car, and related measures in response to save precious lives. In this work, the author proposed an automotive healthcare and safety framework. A control unit called as healthcare control unit controls this framework. This framework is also integrated into an automotive IOT containing telematics and other systems. Performance evaluations shows that this system can help to save lives of pets and infants that are mistakenly left inside parked cars.
Purneet Kaur et al. [22], proposed a technique in which Genetic algorithm and Neural Network are combined together. For extraction of minutiae GA is used and for the recognition of finger print neural network is used. For processing low and high-resolution images histogram equalization process is used. Thinning of lines is done on MATLAB using morphological image processing. The Genetic algorithm is used to find out discontinuous segments. At last, for matching processed image is fed to the trained system. Experimental results show that combination of genetic algorithm and neural network provides better and efficient technique for finger print matching.

V. PROPOSED METHODOLOGY
This work presents an application of precondition that the attacker has access to the local network giving way to the black hole attack. Here we will describe the black hole attack scenario in the network. In proposed work finger print biometric authentication will be done to know that attack has been taken place. To gain access to the system, the user must be identified first and then further checking is done to verify the identity. This work will utilize minutiae feature extraction, feature reduction and failure node detection using a genetic algorithm. In the end proposed model's performance is evaluated using various metrics like throughput, energy consumption, delay and packet delivery ratio. Fig.2 describes the flowchart of the proposed technique.

VI. EXPECTED OUTCOME
A novel method is proposed to designing the Intrusion Detection system to enhance the accuracy in IOT and analyzing the complexity and high security in the development of the proposed model.

VII. CONCLUSION & FUTURE SCOPE
The proposed work has combined wireless sensor network and a biometric authentication system to prevent a native node in sensor network from any suspicious activity if the authentication of the node is true. The authentication of finger print would include a pre-processing feature extraction and a recognition system whereas wireless system would act as some sort of an Adhoc network in which the nodes will change their relative position frequently.
The future aspect of this proposed work is to implement the black hole detection and prevention system along with finger print recognition system to provide secure access to the system. Complexity and high security will be analysed in the development of the proposed model. About Internet of Things from website https://en.wikipedia.org/ wiki/Internet_of_things.