SlideShare a Scribd company logo
1 of 4
Download to read offline
International 
OPEN ACCESS Journal 
Of Modern Engineering Research (IJMER) 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 37| 
A Distributed Approach for Neighbor Position Verification in MANETs Mahendranath Chowdry Kundla1, Kancharla Kalpana2 1 M. Tech (CSE), MVR College of Engineering and Technology, A.P., India. 2Asst. Professor, Dept. of Computer Science & Engineering, MVR College of Engineering and Technology, A.P., India. 
I. INTRODUCTION 
Mobile adhoc networks (MANET) [1] is a popular technology the world society speaks about due to the technology development. The modern world uses internet technology for everything as a part of their life, and now a day they use mobile technology in place of information technology to get access to the location based service. The kind of sophisticated service increases with the risk rate in accessing the service. The service providers have more challenges in providing the services and maintaining the quality of service parameters. A mobile network is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the wireless network topology may change rapidly and unpredictably over time. The MANET network is decentralized; where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves. The verification of the node locations is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In order to find out the neighbor nodes and verify them various techniques are proposed. Neighbour discovery deals with the identification of neighboring nodes with which a communication link can be established or that are within a given distance. An adversarial node could be securely discovered as neighbour node and be indeed a neighbour (within some range), but it could still cheat about its position within the same range. In other words, secure neighbor discovery lets a node assess whether another node is an actual neighbour but it does not verify the location it claims to be at .this is most often employed to counter wormhole attacks. Figure1 shows an example of topological information stored by verifier S at the end of the message exchange and effect of a fake position announcement by M. 
Abstract: Mobile Ad Hoc Network(MANET) is a kind of wireless network where you can find number of base stations which supports the communication of mobile nodes. The mobile node supports the routing process of the communication to improve the throughput of the overall network. The mobile nodes are moving at some speed and towards the direction, which makes the topology of the wireless network gets changing at every fraction of time. Due to this reason there will be number of nodes comes into the coverage area of a base station and leaves, which cannot be trusted for service handling. What the adversary does here is that it replies with the route discovery phase using fake location information with the intension to get participate in the routing process. After gets selected it simply discard the packets received, or manipulate the packets, or else it will never receive the packets because of the false location. This makes the transmission as a failure one and service throughput degrades automatically. Location Based Services are one, which is provided and accessed based on the location content. In a road traffic network the location based service can be accessed in various ways. The routing in the road network becomes more complicated due to the increase in mobile nodes. A mobile node can access a service to know about the traffic and the route to reach a destination by accessing the location based service. The correctness of the node locations is therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. This paper presents a protocol for updating the position of the node in dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is frequent, yet requires little or no overhead during the periods in which hosts move less frequently. 
Keywords: CST, DST, MANET, Neighbor discovery, NPV.
A Distributed Approach for Neighbor Position Verification in MANETs 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 38| 
Fig.1: Neighbor discovery in adversarial environment 
Neighbor verification [2] schemes often rely on fixed or mobile trustworthy nodes, which are assumed 
to be always available for the verification of the neighbor positions announced by third parties. In mobile ad 
hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be 
aprioristically trusted is quite unrealistic. Thus, a protocol is devised that is autonomous and does not require 
the trustworthy neighbours. A mobile ad hoc network is the collection of wireless mobile hosts forming a 
temporary network without the aid of any established infrastructure or centralized administration. In such an 
environment, it is necessary for one mobile node to enlist the aid of other hosts in forwarding a packet to its 
destination, due to the limited range of each mobile node’s wireless transmissions. In order to procure the 
position of other nodes while moving, an approach is proposed such a way that it helps in obtaining the 
position of a dynamic mobile node. This paper presents a protocol for updating the position of the node in 
dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is 
frequent, yet requires little or no overhead during the periods in which hosts move less frequently. 
II. RELATED WORK 
In [3] , the authors propose an Adaptive Hello Messaging Scheme for Neighbor Discovery in On- 
Demand MANET Routing Protocols. The authors present an adaptive Hello messaging scheme to suppress 
unnecessary Hello messages without reduced detectability of the broken links. Simulation results show that the 
proposed method reduces energy consumption and the network overhead without any explicit difference in 
throughput. In [4], the authors propose Dynamic Neighbor Positioning In Manet with Protection against 
Adversarial Attacks. The authors present techniques for finding neighbours effectively in a non priori trusted 
environment are identified. These techniques will eventually provide security from attacker nodes. The 
protocol is robust to malicious attacks. This protocol will also update the position of the mobile nodes in an 
active environment. The performance of the proposed method will be effective one. 
In [5], the authors propose Neighbor node discovery and Trust prediction in MANETs. This paper 
uses the directional antenna algorithm known as scanning based direct discovery algorithm to discover the 
neighbour nodes. To enable the cooperative working of the various distributed protocols we use trust system to 
provide the trust level of various mobile nodes, thereby enhancing the cooperation among the nodes. This 
paper uses the distributed hybrid trust algorithm and also uses relationship maturity concept to compute the 
trust of the mobile nodes. This paper demonstrates that Trust systems are better than already existing 
encryption techniques. For the discovery of mobile nodes [6], the authors explored the various attacks possible 
in the physical and communication medium of the MANETs. The authors classified the neighbor discovery as 
physical and communication neighbor discovery. Protocols aiming at communication neighbour discovery, 
which are based on physical discovery protocols, often fail to achieve their objective. This is because that these 
two types of discovery are not equivalent. At the same time, the protocols for communication neighbour 
discovery do not fully address the problem at hand. They are very effective only under very specific operational 
conditions or they do not ensure correctness in all cases.
A Distributed Approach for Neighbor Position Verification in MANETs 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 39| 
For the verification of Neighbor position [7] [8], there are techniques that was studied in the context of mobile ad hoc and sensor networks; however, existing Neighbor Position Verification schemes often rely on traditional or mobile trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In mobile ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. 
III. PROPOSED WORK 
In this paper we propose a fully distributed cooperative scheme for neighbor position verification (NPV), which enables a node, hereinafter called the verifier, to discover and verify the position of its communication neighbors. 1. NPV Protocol The proposed NPV protocol is designed for spontaneous mobile ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes. This protocol leverages cooperation but allows a node to perform all verification procedures autonomously. This method has no need for lengthy interactions, e.g., to reach a consensus among multiple mobile nodes, making our scheme suitable for both low and high mobility environments. It is reactive, meaning that it can be executed by any mobile node, at any point in time, without prior knowledge of the neighborhood. It is robust against independent and colluding attacks. It is lightweight, as it generates low overhead routing traffic. Algorithm 1: Step 1: node S do Step 2: S ->* : (POLL, K’s) Step 3: S : store ts Step 4: When receive REPLY from X E Step 5: S : store txs, cx Step 6: after Tmax + Tjitter do Step 7: S : ms={(cx, ix)/txs)} 2. Direct Symmetry Test The Direct Symmetry Test(DST) verifies the direct links with its communication neighbor nodes. To this end, DST checks whether reciprocal to F-derived distances are consistent with each other and with the position advertised by the neighbor node and with a proximity range. The latter corresponds to the maximum nominal transmission range, and upper bounds the distance at which the two nodes can communicate. Algorithm 2: Step 1: node S do Step 2: S: Fs<-0 Step 3: For all X E Ns do Step 4: If dsx – dxs > 2 or Step 5: ps – px / - dxs > 2 or Step 6: dsx > R then Step 7: S:Fs<-X 3. Cross Symmetry Test The cross symmetry test(CST) ignores nodes already declared as faulty by the DST and only considers mobile nodes that proved to be communication neighbor nodes between each other, i.e., for which To F derived mutual distances are available. However, pairs of neighbor nodes declaring collinear positions with respect to S are not taken into account. This choice makes our NPV robust to attacks in many particular situations. For all other pair the cross test verifies the symmetry of the reciprocal distances and their consistency with the positions declared by the neighbor nodes and with the proximity range. For each neighbor maintains a link counter and a mismatch counter. The former is incremented at every new crosscheck on X, and records the number of communication links between neighbor and other neighbors. The latter is incremented every time at least one of the cross-checks on distance and the position fails and identifies the potential for neighbor being faulty.
A Distributed Approach for Neighbor Position Verification in MANETs 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 40| 
Algorithm 3: Step 1: node S do Step 2: S:Us<- 0, Ws<- 0 Step 3: For all X E Ns, X E Fs do Step 4: if dxy , dyx and Step 5: Ps E line(px , py) Step 6: S:lx=lx+1, ly=ly+1 Step 7: If dxy-dyx > 2x+e or Step 8: dxy > R then Step 9: S: mx=mx+1. 
IV. CONCLUSION 
In mobile ad hoc networks(MANETs), position aided routing protocols can offer a significant performance increase over fixed ad hoc routing protocols. As position information is broadcasted including the attacker to receive. Routes may be disconnected due to the dynamic movement of mobile nodes. Such mobile networks are more vulnerable to both internal and external attacks due to presence of the attacker nodes. These mobile nodes affect the performance of the routing protocol in ad hoc networks. So it is essential to identify the neighbor nodes in MANET. The Neighbor Position Verification (NPV) is a routing protocol designed to protect the wireless network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in ad hoc network routing. 
REFERENCES 
[1] Chansu Yu, y Ben Lee , Hee Yong Youn, ”Energy Efficient routing protocols for mobile ad hoc networks”, Wireless Communications and Mobile Computing, John Wiley & Sons, Ltd, PP-959–973, 2003. [2] E. Ekici, S. Vural, J. McNair, and D. Al-Abri, “Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 2, pp. 195-209, 2008. [3] Seon Yeong Han, 2013. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols, IEEE Transactions on communication, 17(5): 1040-1043. [4] Priyadarshani, K., 2013. Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks, IJCER, 3(4). [5] Thilagavathy, S., 2013. Neighbor node discovery and Trust prediction in manets, International Journal of Science, Engineering and Technology Research (IJSETR), 2(1). [6] Poturalksi, M., P. Papadimitratos and J.P. Hubaux, 2008. “Towards Provable Secure Neighbor Discovery in Wireless Networks,” Proc. Workshop Formal Methods in Security Eng. [7] Chiang, J., J. Haas and Y. Hu, 2009. “Secure and PreciseLocation Verification Using Distance Bounding and Simultaneous Multilateration,” Proc. Second ACM Conf. Wireless Network Security (WiSec). [8] Capkun, S., K. Rasmussen, M. Cagalj and M. Srivastava, 2008. “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Trans. Mobile Computing, 7(4): 470-483.

More Related Content

Viewers also liked

Ijmer 46043741
Ijmer 46043741Ijmer 46043741
Ijmer 46043741IJMER
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic EnclosureIJMER
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...IJMER
 
Strong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeStrong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeIJMER
 
Cz3210711074
Cz3210711074Cz3210711074
Cz3210711074IJMER
 
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...
Enhance Example-Based Super Resolution to Achieve Fine  Magnification of Low ...Enhance Example-Based Super Resolution to Achieve Fine  Magnification of Low ...
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...IJMER
 
Safety Margin of Slope Stability Using Common Deterministic Methods
Safety Margin of Slope Stability Using Common Deterministic  MethodsSafety Margin of Slope Stability Using Common Deterministic  Methods
Safety Margin of Slope Stability Using Common Deterministic MethodsIJMER
 
Efficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyEfficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyIJMER
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...IJMER
 
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...IJMER
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental EquationIJMER
 
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...IJMER
 
Vibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case StudyVibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case StudyIJMER
 
An Analytical Study of International Standards on Minority Rights
An Analytical Study of International Standards on Minority  Rights An Analytical Study of International Standards on Minority  Rights
An Analytical Study of International Standards on Minority Rights IJMER
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...IJMER
 
Fatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactorFatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactorIJMER
 
B04010 03 0914
B04010 03 0914B04010 03 0914
B04010 03 0914IJMER
 
3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris RecognitionIJMER
 

Viewers also liked (20)

Ijmer 46043741
Ijmer 46043741Ijmer 46043741
Ijmer 46043741
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
Strong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeStrong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision Purpose
 
Cz3210711074
Cz3210711074Cz3210711074
Cz3210711074
 
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...
Enhance Example-Based Super Resolution to Achieve Fine  Magnification of Low ...Enhance Example-Based Super Resolution to Achieve Fine  Magnification of Low ...
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...
 
Safety Margin of Slope Stability Using Common Deterministic Methods
Safety Margin of Slope Stability Using Common Deterministic  MethodsSafety Margin of Slope Stability Using Common Deterministic  Methods
Safety Margin of Slope Stability Using Common Deterministic Methods
 
Efficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyEfficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar Energy
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
 
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental Equation
 
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
 
Vibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case StudyVibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case Study
 
An Analytical Study of International Standards on Minority Rights
An Analytical Study of International Standards on Minority  Rights An Analytical Study of International Standards on Minority  Rights
An Analytical Study of International Standards on Minority Rights
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
 
Fatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactorFatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactor
 
B04010 03 0914
B04010 03 0914B04010 03 0914
B04010 03 0914
 
3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 

Recently uploaded (20)

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

A Distributed Approach for Neighbor Position Verification in MANETs

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 37| A Distributed Approach for Neighbor Position Verification in MANETs Mahendranath Chowdry Kundla1, Kancharla Kalpana2 1 M. Tech (CSE), MVR College of Engineering and Technology, A.P., India. 2Asst. Professor, Dept. of Computer Science & Engineering, MVR College of Engineering and Technology, A.P., India. I. INTRODUCTION Mobile adhoc networks (MANET) [1] is a popular technology the world society speaks about due to the technology development. The modern world uses internet technology for everything as a part of their life, and now a day they use mobile technology in place of information technology to get access to the location based service. The kind of sophisticated service increases with the risk rate in accessing the service. The service providers have more challenges in providing the services and maintaining the quality of service parameters. A mobile network is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the wireless network topology may change rapidly and unpredictably over time. The MANET network is decentralized; where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves. The verification of the node locations is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In order to find out the neighbor nodes and verify them various techniques are proposed. Neighbour discovery deals with the identification of neighboring nodes with which a communication link can be established or that are within a given distance. An adversarial node could be securely discovered as neighbour node and be indeed a neighbour (within some range), but it could still cheat about its position within the same range. In other words, secure neighbor discovery lets a node assess whether another node is an actual neighbour but it does not verify the location it claims to be at .this is most often employed to counter wormhole attacks. Figure1 shows an example of topological information stored by verifier S at the end of the message exchange and effect of a fake position announcement by M. Abstract: Mobile Ad Hoc Network(MANET) is a kind of wireless network where you can find number of base stations which supports the communication of mobile nodes. The mobile node supports the routing process of the communication to improve the throughput of the overall network. The mobile nodes are moving at some speed and towards the direction, which makes the topology of the wireless network gets changing at every fraction of time. Due to this reason there will be number of nodes comes into the coverage area of a base station and leaves, which cannot be trusted for service handling. What the adversary does here is that it replies with the route discovery phase using fake location information with the intension to get participate in the routing process. After gets selected it simply discard the packets received, or manipulate the packets, or else it will never receive the packets because of the false location. This makes the transmission as a failure one and service throughput degrades automatically. Location Based Services are one, which is provided and accessed based on the location content. In a road traffic network the location based service can be accessed in various ways. The routing in the road network becomes more complicated due to the increase in mobile nodes. A mobile node can access a service to know about the traffic and the route to reach a destination by accessing the location based service. The correctness of the node locations is therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. This paper presents a protocol for updating the position of the node in dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is frequent, yet requires little or no overhead during the periods in which hosts move less frequently. Keywords: CST, DST, MANET, Neighbor discovery, NPV.
  • 2. A Distributed Approach for Neighbor Position Verification in MANETs | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 38| Fig.1: Neighbor discovery in adversarial environment Neighbor verification [2] schemes often rely on fixed or mobile trustworthy nodes, which are assumed to be always available for the verification of the neighbor positions announced by third parties. In mobile ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. Thus, a protocol is devised that is autonomous and does not require the trustworthy neighbours. A mobile ad hoc network is the collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it is necessary for one mobile node to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile node’s wireless transmissions. In order to procure the position of other nodes while moving, an approach is proposed such a way that it helps in obtaining the position of a dynamic mobile node. This paper presents a protocol for updating the position of the node in dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is frequent, yet requires little or no overhead during the periods in which hosts move less frequently. II. RELATED WORK In [3] , the authors propose an Adaptive Hello Messaging Scheme for Neighbor Discovery in On- Demand MANET Routing Protocols. The authors present an adaptive Hello messaging scheme to suppress unnecessary Hello messages without reduced detectability of the broken links. Simulation results show that the proposed method reduces energy consumption and the network overhead without any explicit difference in throughput. In [4], the authors propose Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks. The authors present techniques for finding neighbours effectively in a non priori trusted environment are identified. These techniques will eventually provide security from attacker nodes. The protocol is robust to malicious attacks. This protocol will also update the position of the mobile nodes in an active environment. The performance of the proposed method will be effective one. In [5], the authors propose Neighbor node discovery and Trust prediction in MANETs. This paper uses the directional antenna algorithm known as scanning based direct discovery algorithm to discover the neighbour nodes. To enable the cooperative working of the various distributed protocols we use trust system to provide the trust level of various mobile nodes, thereby enhancing the cooperation among the nodes. This paper uses the distributed hybrid trust algorithm and also uses relationship maturity concept to compute the trust of the mobile nodes. This paper demonstrates that Trust systems are better than already existing encryption techniques. For the discovery of mobile nodes [6], the authors explored the various attacks possible in the physical and communication medium of the MANETs. The authors classified the neighbor discovery as physical and communication neighbor discovery. Protocols aiming at communication neighbour discovery, which are based on physical discovery protocols, often fail to achieve their objective. This is because that these two types of discovery are not equivalent. At the same time, the protocols for communication neighbour discovery do not fully address the problem at hand. They are very effective only under very specific operational conditions or they do not ensure correctness in all cases.
  • 3. A Distributed Approach for Neighbor Position Verification in MANETs | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 39| For the verification of Neighbor position [7] [8], there are techniques that was studied in the context of mobile ad hoc and sensor networks; however, existing Neighbor Position Verification schemes often rely on traditional or mobile trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In mobile ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. III. PROPOSED WORK In this paper we propose a fully distributed cooperative scheme for neighbor position verification (NPV), which enables a node, hereinafter called the verifier, to discover and verify the position of its communication neighbors. 1. NPV Protocol The proposed NPV protocol is designed for spontaneous mobile ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes. This protocol leverages cooperation but allows a node to perform all verification procedures autonomously. This method has no need for lengthy interactions, e.g., to reach a consensus among multiple mobile nodes, making our scheme suitable for both low and high mobility environments. It is reactive, meaning that it can be executed by any mobile node, at any point in time, without prior knowledge of the neighborhood. It is robust against independent and colluding attacks. It is lightweight, as it generates low overhead routing traffic. Algorithm 1: Step 1: node S do Step 2: S ->* : (POLL, K’s) Step 3: S : store ts Step 4: When receive REPLY from X E Step 5: S : store txs, cx Step 6: after Tmax + Tjitter do Step 7: S : ms={(cx, ix)/txs)} 2. Direct Symmetry Test The Direct Symmetry Test(DST) verifies the direct links with its communication neighbor nodes. To this end, DST checks whether reciprocal to F-derived distances are consistent with each other and with the position advertised by the neighbor node and with a proximity range. The latter corresponds to the maximum nominal transmission range, and upper bounds the distance at which the two nodes can communicate. Algorithm 2: Step 1: node S do Step 2: S: Fs<-0 Step 3: For all X E Ns do Step 4: If dsx – dxs > 2 or Step 5: ps – px / - dxs > 2 or Step 6: dsx > R then Step 7: S:Fs<-X 3. Cross Symmetry Test The cross symmetry test(CST) ignores nodes already declared as faulty by the DST and only considers mobile nodes that proved to be communication neighbor nodes between each other, i.e., for which To F derived mutual distances are available. However, pairs of neighbor nodes declaring collinear positions with respect to S are not taken into account. This choice makes our NPV robust to attacks in many particular situations. For all other pair the cross test verifies the symmetry of the reciprocal distances and their consistency with the positions declared by the neighbor nodes and with the proximity range. For each neighbor maintains a link counter and a mismatch counter. The former is incremented at every new crosscheck on X, and records the number of communication links between neighbor and other neighbors. The latter is incremented every time at least one of the cross-checks on distance and the position fails and identifies the potential for neighbor being faulty.
  • 4. A Distributed Approach for Neighbor Position Verification in MANETs | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 40| Algorithm 3: Step 1: node S do Step 2: S:Us<- 0, Ws<- 0 Step 3: For all X E Ns, X E Fs do Step 4: if dxy , dyx and Step 5: Ps E line(px , py) Step 6: S:lx=lx+1, ly=ly+1 Step 7: If dxy-dyx > 2x+e or Step 8: dxy > R then Step 9: S: mx=mx+1. IV. CONCLUSION In mobile ad hoc networks(MANETs), position aided routing protocols can offer a significant performance increase over fixed ad hoc routing protocols. As position information is broadcasted including the attacker to receive. Routes may be disconnected due to the dynamic movement of mobile nodes. Such mobile networks are more vulnerable to both internal and external attacks due to presence of the attacker nodes. These mobile nodes affect the performance of the routing protocol in ad hoc networks. So it is essential to identify the neighbor nodes in MANET. The Neighbor Position Verification (NPV) is a routing protocol designed to protect the wireless network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in ad hoc network routing. REFERENCES [1] Chansu Yu, y Ben Lee , Hee Yong Youn, ”Energy Efficient routing protocols for mobile ad hoc networks”, Wireless Communications and Mobile Computing, John Wiley & Sons, Ltd, PP-959–973, 2003. [2] E. Ekici, S. Vural, J. McNair, and D. Al-Abri, “Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 2, pp. 195-209, 2008. [3] Seon Yeong Han, 2013. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols, IEEE Transactions on communication, 17(5): 1040-1043. [4] Priyadarshani, K., 2013. Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks, IJCER, 3(4). [5] Thilagavathy, S., 2013. Neighbor node discovery and Trust prediction in manets, International Journal of Science, Engineering and Technology Research (IJSETR), 2(1). [6] Poturalksi, M., P. Papadimitratos and J.P. Hubaux, 2008. “Towards Provable Secure Neighbor Discovery in Wireless Networks,” Proc. Workshop Formal Methods in Security Eng. [7] Chiang, J., J. Haas and Y. Hu, 2009. “Secure and PreciseLocation Verification Using Distance Bounding and Simultaneous Multilateration,” Proc. Second ACM Conf. Wireless Network Security (WiSec). [8] Capkun, S., K. Rasmussen, M. Cagalj and M. Srivastava, 2008. “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Trans. Mobile Computing, 7(4): 470-483.