SlideShare a Scribd company logo
1 of 5
Download to read offline
Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10
www.ijera.com 6 | P a g e
Route Discovery and Hop Node Verification to Ensure
Authenticated Data Transmissions in Manet
Anitha.M1
& Surya.R.M2
[Asst. Prof]
Dept. Of Applied Electronics Jayam College of Engineering and Technology Nallanur, Dharmapuri.
ABSTRACT
In mobile ad hoc network, Position aided routing protocols can offer a significant performance increase over
traditional ad hoc routing protocols. As position information is broadcasted including the enemy to receive.
Routes may be disconnected due to dynamic movement of nodes. Such networks are more vulnerable to both
internal and external attacks due to presence of adversarial nodes. These nodes affect the performance of routing
protocol in ad hoc networks. So it is essential to identify the neighbours in MANET. The “Neighbor Position
Verification” (NPV), is a routing protocol designed to protect the network from adversary nodes by verifying
the position of neighbor nodes to improve security, efficiency and performance in MANET routing.
I. INTRODUCTION
MANET is an autonomous collection of
mobile users that communicated over relatively
bandwidth constrained wireless links, and the
MANETs is to solve challenging real world
problems. Since the nodes are mobile so it is dynamic
in nature. The network topology may change rapidly
and unpredictably over time. It is a unstructured
network. It doesn’t work constantly under any
topology. The network is decentralized where all
network activity including discovering and topology
and delivering message must be executed by the
nodes themselves. Neighbor discovery (ND) provides
an essential functionality for wireless devices that is
to discover other devices that they can communicate
directly through the wireless networking. Routing
begin the most essential in the context of wireless
communication makes it easy to abuse ND.
The verification of node locations is an
important issues in mobile networks, and it becomes
particularly challenging in the presence of
adversaries aiming at harming the system.
Finding the position of a neighbour
Neighbour discovery deals with the
identification of nodes with which a communication
link can established or that are within a given
distance. An adversarial node could be securely
discovered as neighbour and be indeed a neighbour
(with in some range ),but it could still cheat about its
position within the same range. In other words, SND
lets a node assess whether another node is an actual
neighbour but it does not verify the location it claims
to be at. This is most often employed to counter
wormhole attacks.
Figure1. Neighbor discovery in adversarial
environment
Confirmation of claimed position.
Neighbor verification schemes often rely on
fixed or mobile trustworthy nodes, which are
assumed to be always available for the verification of
the positions announced by third parties. In ad hoc
environments, however the pervasive presence of
either infrastructure or neighbor nodes that can be
aprioristically trusted is quite unrealistic. Thus, a
protocol is devised that is autonomous and does not
require trustworthy neighbours.
Importance Of Neighbor Position Update
An ad hoc network is the collection of
wireless mobile hosts forming a temporary without
the aid of any established infrastructure or centralized
administration. In such an environment , it is
necessary for one mobile host to enlist the aid of
other hosts in forwarding packet to its destination,
due to the limited range of each mobile host’s
wireless transmissions. In order to procure the
position of other nodes while moving, an approach is
proposed such a way that it helps in obtaining the
position of dynamic mobile node. This paper presents
a protocol for updating the position of node in
RESEARCH ARTICLE OPEN ACCESS
Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10
www.ijera.com 7 | P a g e
dynamic ad hoc networks. The protocol adapts
quickly to position changes when host movement is
frequent, yet requires little or no overhead during
periods in which hosts move less frequently.
OVERVIEW
The presented a distributed solution for
NPV, which allows any node in mobile ad hoc
network to verify the position of its communication
neighbor without relying on priori trust worthy
nodes. The analysis showed that the protocol is very
robust to attacks by independent as well as colluding
adversaries, even when they have perfect knowledge
of the neighbourhood of the verifier. simulation
results confirm that the solutions is effective in
identifying nodes advertising false positions, while
keeping the probability of false positions, while
keeping the probability of false positives low. Only
an overwhelming presence of colluding adversaries
in the neighbourhood of the verifier, or the unlikely
presence of fully collinear network topologies, can
degrade the effectiveness of our NPV. Future work
will aim at integrating the protocols, as well as at
extending it to proactive paradigm, useful in presence
of applications that position of the neighbours.
PROBLEM STATEMENT
This deal with a mobile ad hoc network,
where a pervasive infrastructure is not present, and
the location data must be obtained through node-to-
node communication. Such a scenario is of particular
interest since it leaves the door open for adversarial
nodes to misuse or disrupt the location based
services.
II. EXISTING SYSTEM
In existing methodology, a fully distributed
cooperative scheme for NPV, which enables a source
node, to discover and verify the position of its
communication neighbours. For clarity, here we
summarize the principles of route discovery and
position verification process. A source node, S can
initiate the protocol at any time instant, by triggering
the 4-step message exchange process [POLL,
REPLY,REVEAL and REPORT ], after completing
the message exchange process, source node S has
derives distance range of neighbour nodes to discover
the shortest path to reach destination, after route
discovery S runs several position verification tests in
order to classify each candidate neighbour as either
VERIFIED, FAULTY, UNVERFIABLE. Clearly ,
the verification tests aim at avoiding false
negatives(i.e..adversaries announcing fake positions
that are deemed verified) and false positives (i.e.,
correct nodes whose positions are deemed faulty),as
well as at minimizing the number of unverifiable
nodes. we remark that our NPV scheme does not
target the creation of a consistent “map” of
neighbourhood relations throughout an ephemeral
network: rather, it allows the verifier to
independently classify its neighbours.
Figure2.Messages Exchange Process
EXISTING SYSTEM METHODOLOGY
POLL message A verifier S initiates this message.
This message is anonymous. The identity of the
verifier is kept hidden. Here software generated
MAC address is used. This carries a public key K’S
chosen from a pool of onetime use keys of S’.
REPLY message A communication neighbor X
receiving the POLL message will broadcast REPLY
message after a time interval with a freshly generated
MAC address. This also internally saves the
transmission time. This also contains some encrypted
message with S public key (K’S). This message is
called as commitment of XCX.
REVEAL message The REVEAL message is
broadcasted using verifier’s real MAC address. It
contains A map MS, a proof that S is the author of
the original POLL and the verifier identity, i.e., its
certified public key and signature.
REPORT message The REPORT carries X’s
position, the transmission time of X’s REPLY, and
the list of pairs of reception times and temporary
identifiers referring to REPLY broadcasts X received.
The identifiers are obtained from the map MS
included in the REVEAL message. Also, X discloses
its own identity by including in the message its
digital signature and certified public key.
The node position verification is not suitable
for dynamic environment, since mobile nodes are in
dynamic in nature, so each and every schedule the
mobile nodes undergoes position verification test,
thus results in delay time of packet delivery ratio.
III. PROPOSED SYSTEM
In proposed system the NPV protocol is
extended to dynamic source configuration routing
protocol, which results in mobile node verification
Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10
www.ijera.com 8 | P a g e
instead of node position verification. The node
position verification achieved through hash function,
which states that if source node wants to verify the
neighbor nodes the source S generates a hash id
through hash function H(n)=PUB_KEY/IDENTITY,
the public key and id of source node generates hash
id. In the same way the neighbor nodes generates
hash id are same then the nodes are authenticated for
data transmission through the minimum distance
range discovered path to destination.
The proposed technique works in all kinds
of environment and provides a secure data
transmission and also decreases the time delay,
improves the PDR, and throughput rate in network
performance.
Proposed Algorithm Implementation
MD5 (MESSAGE-DIGEST ALGORITHM) is a
widely used cryptographic function with a 128- bit
hash value. MD5 has been employed in a wide
variety of security applications, and is also
commonly used to check the integrity of files. An
MD5 hash is typically expressed as a 32-digit
hexadecimal number.
IV. SYSTEM MODEL
Node Configuration Setting
The mobile nodes are designed and
configured dynamically, designed to employ across
the network, the nodes are set according to the X, Y,
Z dimension, which the nodes have the direct
transmission range to all other nodes.
Nodes Unique Identity
All the mobile nodes tend to have a unique
id for its identification process, since the mobile
nodes communicates with other nodes through its
own network id. If any mobile node opted out of the
network then the particular node should surrender its
network id to the head node.
Message exchange process for route discovery
This module states a 4 step message
exchange process i.e. POLL, REPLY, REVEAL, and
REPORT. As soon the protocol executed the, POLL
and REPLY messages are first broadcasted by Source
and its neighbors, respectively. These messages are
anonymous and take advantage of the broadcast
nature of the wireless medium, allowing nodes to
record reciprocal timing information without
disclosing their identities.
Distance Computation
In order to compute the distance range, after
a POLL and REPLY message a REVEAL message
broadcast by the source nodes disclose to S, through
secure and authenticated REPORT messages, their
identities as well as the anonymous timing
information they collected. The source S uses such
data to match timings and identities; then, it uses the
timings to perform To F-based ranging and compute
distances between all pairs of communicating nodes
in its neighborhood.
Node Position Verification
Once Source node has derived such
distances, it runs several position verification tests in
order to classify each candidate neighbor as either:
Verified node, i.e., a node the verifier deems to be at
the claimed position or Faulty node, i.e., a node the
verifier deems to have announced an incorrect
position or Unverifiable node, i.e., a node the verifier
cannot prove to be either correct or faulty, due to
insufficient information. The position verification is
performed by direct symmetric test, cross symmetry
test and multilateration test.
Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10
www.ijera.com 9 | P a g e
Node Verification Process
In this module a proposed work of node
verification technique is introduced to detect the
adversary nodes in the network. The node
verification is done by hash function technique the
public key and id of source node generates hash id. In
the same way the neighbor nodes generate the hash
id, if the source node hash id and neighbor node hash
id are same then the nodes are authenticated for data
transmission through the minimum distance range
discovered path to destination.
Routing Algorithms
Most QoS routing algorithms represent an
extension of existing classic best-effort routing
algorithms. Many routing protocols have been
developed which support establishing and
maintaining multi-hop routes between nodes in
MANETs. These algorithms can be classified into
two different categories: on-demand (reactive) such
as DSR, AODV, and TORA, and table-driven
(proactive) such as Destination Sequenced Distance
Vector protocol (DSDV). In the on-demand
protocols, routes are discovered between a source and
a destination only when the need arises to send data.
This provides a reduced overhead of
communication and scalability. In the table-driven
protocols, routing tables which contain routing
information between all nodes are generated and
maintained continuously regardless of the need of
any given node to communicate at that time. With
this approach, the latency for route acquisition is
relatively small, which might be necessary for certain
applications, but the cost of communications
overhead incurred in the continued update of
information for routes which might not be used for a
long time if at all is too high.
DSR - Dynamic Source Routing Protocol
DSR is one of the most well known routing
algorithms for ad hoc wireless networks. It was
originally developed by Johnson, Maltz, and Broch.
DSR uses source routing, which allows packet
routing to be loop free. It increases its efficiency by
allowing nodes that are either forwarding route
discovery requests or overhearing packets through
promiscuous listening mode to cache the routing
information for future use.
DSR is also on demand, which reduces the
bandwidth use especially in situations where the
mobility is low. It is a simple and efficient routing
protocol for use in ad hoc networks. It has two
important phases, route discovery and route
maintenance.
V. CONCLUSION
Techniques for finding neighbors effectively
in a non priori trusted environment are identified. The
proposed techniques will eventually provide security
from malicious nodes. The protocol is robust to
adversarial attacks. This protocol will also update the
position of the nodes in an active environment. The
performance of the proposed scheme will be effective
one.
REFERENCES
[1] Marco Fiore,Claudio Ettore Casetti and
Panagioties papadimitratos “ Discovery And
Verification Of Neighbor Position In Mobile Ad
Hoc Networks”, Members IEEE,feb 2013
[2] R. Maheshwari, J. Gao, and S. Das, “Detecting
Wormhole Attacks in Wireless Networks Using
Connectivity Information,” Proc. IEEE
INFOCOM, Apr. 2007.
[3] P. Papadimitratos, L. Buttyan, T. Holczer, E.
Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl,
A. Kung, and J.-P. Hubaux, “Secure Vehicular
Communications: Design and Architecture,”
IEEE Comm. Magazine, vol. 46, no. 11, pp. 100-
109, Nov. 2008.
[4] P. Papadimitratos and A. Jovanovic, “GNSS-
Based Positioning: Attacks and
Countermeasures,” Proc. IEEE Military Comm.
Conf. (MILCOM), Nov. 2008.
[5] R. Poovendran and L. Lazos, “A Graph Theoretic
Framework for Preventing the Wormhole
Attack,” Wireless Networks, vol. 13,pp. 27-59,
2007.
[6] S. Capkun, K. Rasmussen, M. Cagalj, and M.
Srivastava, “Secure Location Verification with
Hidden and Mobile Base Stations,” IEEE Trans.
Mobile Computing, vol. 7, no. 4, pp. 470-483,
Apr. 2008.
[7] R. Shokri, M. Poturalski, G. Ravot, P.
Papadimitratos, and J.-P. Hubaux,“A Practical
Secure Neighbor Verification Protocol for
Wireless Sensor Networks,” Proc. Second ACM
Conf. Wireless Network Security (WiSec), Mar.
2009.
[8] P. Papadimitratos, M. Poturalski, P. Schaller, P.
Lafourcade, D. Basin, S. Capkun, and J.-P.
Hubaux, “Secure Neighborhood Discovery: A
Fundamental Element for Mobile Ad Hoc
Networks,” IEEE Comm. Magazine, vol. 46, no.
2, pp. 132-139, Feb. 2008.
[9] M. Poturalski, P. Papadimitratos, and J.-P.
Hubaux, “Secure Neighbor Discovery in Wireless
Networks: Formal Investigation of Possibility,”
Proc. ACM Symp. Information, Computer and
Comm.Security (ASIACCS), Mar. 2008
[10] M. Poturalksi, P. Papadimitratos, and J.-P.
Hubaux, “Towards Provable Secure Neighbor
Discovery in Wireless Networks,” Proc.
Workshop Formal Methods in Security Eng.,
Oct.2008.
Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10
www.ijera.com 10 | P a g e
Anitha.M has
obtained her BE degree in
Electronics and Communication
Engineering from Sengunthar
college of Engineering,
Tiruchencode in 2012. Currently she
is doing her ME in Applied
Electronics at Jayam College of
Engineering and Technology,
Dharmapuri. Presently she is
involving in developing a advanced
security method for data
transmission in mobile ad hoc
networks. She has published more
than two research papers in national
and international conferences. Her
special areas of interest are
networking, mobile computing and
digital electronics.
Surya.R.M has
obtained her BE degree in Electronics and
Communication Engineering from Paavai
Engineering College. She received her ME
degree in Applied Electronics from Jayam
College of Engineering and Technology. She
published more than six research papers in
various national and international
conferences/journals. At present She is
working as Assistant Professor in the
department of Electronics and
Communication Engineering in Jayam
College of Engineering and Technology. She
has participated in various national level
workshops and seminars at various
colleges.

More Related Content

What's hot

A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetIJSRD
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackMehedi
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSpharmaindexing
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVIJERA Editor
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (17)

A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
I1802046780
I1802046780I1802046780
I1802046780
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
I1086066
I1086066I1086066
I1086066
 
Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Viewers also liked (20)

Gi3511181122
Gi3511181122Gi3511181122
Gi3511181122
 
B43011014
B43011014B43011014
B43011014
 
B43050518
B43050518B43050518
B43050518
 
Ed4301791797
Ed4301791797Ed4301791797
Ed4301791797
 
Ak4301197200
Ak4301197200Ak4301197200
Ak4301197200
 
U4102167175
U4102167175U4102167175
U4102167175
 
F41023946
F41023946F41023946
F41023946
 
S4102152159
S4102152159S4102152159
S4102152159
 
P4102112120
P4102112120P4102112120
P4102112120
 
V4102176181
V4102176181V4102176181
V4102176181
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Galicia Lucas
Galicia LucasGalicia Lucas
Galicia Lucas
 
Instant followers on keek
Instant followers on keekInstant followers on keek
Instant followers on keek
 
Maryuri..sarabia
Maryuri..sarabiaMaryuri..sarabia
Maryuri..sarabia
 
NEGOCIOS POR INTERNET, DECÚBRELOS!!
NEGOCIOS POR INTERNET, DECÚBRELOS!!NEGOCIOS POR INTERNET, DECÚBRELOS!!
NEGOCIOS POR INTERNET, DECÚBRELOS!!
 
Curso snte oei presentacion clase 4
Curso snte oei   presentacion  clase 4Curso snte oei   presentacion  clase 4
Curso snte oei presentacion clase 4
 
uso correcto del internet
uso correcto del internetuso correcto del internet
uso correcto del internet
 
Las ti cs
Las ti csLas ti cs
Las ti cs
 
T-Mobile en Affiliates 2011
T-Mobile en Affiliates 2011T-Mobile en Affiliates 2011
T-Mobile en Affiliates 2011
 
Livro de poesia 7 a para blogue
Livro de poesia 7 a para blogueLivro de poesia 7 a para blogue
Livro de poesia 7 a para blogue
 

Similar to B43040610

Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIJERA Editor
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 

Similar to B43040610 (20)

Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
E42043640
E42043640E42043640
E42043640
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

B43040610

  • 1. Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10 www.ijera.com 6 | P a g e Route Discovery and Hop Node Verification to Ensure Authenticated Data Transmissions in Manet Anitha.M1 & Surya.R.M2 [Asst. Prof] Dept. Of Applied Electronics Jayam College of Engineering and Technology Nallanur, Dharmapuri. ABSTRACT In mobile ad hoc network, Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. As position information is broadcasted including the enemy to receive. Routes may be disconnected due to dynamic movement of nodes. Such networks are more vulnerable to both internal and external attacks due to presence of adversarial nodes. These nodes affect the performance of routing protocol in ad hoc networks. So it is essential to identify the neighbours in MANET. The “Neighbor Position Verification” (NPV), is a routing protocol designed to protect the network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in MANET routing. I. INTRODUCTION MANET is an autonomous collection of mobile users that communicated over relatively bandwidth constrained wireless links, and the MANETs is to solve challenging real world problems. Since the nodes are mobile so it is dynamic in nature. The network topology may change rapidly and unpredictably over time. It is a unstructured network. It doesn’t work constantly under any topology. The network is decentralized where all network activity including discovering and topology and delivering message must be executed by the nodes themselves. Neighbor discovery (ND) provides an essential functionality for wireless devices that is to discover other devices that they can communicate directly through the wireless networking. Routing begin the most essential in the context of wireless communication makes it easy to abuse ND. The verification of node locations is an important issues in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. Finding the position of a neighbour Neighbour discovery deals with the identification of nodes with which a communication link can established or that are within a given distance. An adversarial node could be securely discovered as neighbour and be indeed a neighbour (with in some range ),but it could still cheat about its position within the same range. In other words, SND lets a node assess whether another node is an actual neighbour but it does not verify the location it claims to be at. This is most often employed to counter wormhole attacks. Figure1. Neighbor discovery in adversarial environment Confirmation of claimed position. Neighbor verification schemes often rely on fixed or mobile trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In ad hoc environments, however the pervasive presence of either infrastructure or neighbor nodes that can be aprioristically trusted is quite unrealistic. Thus, a protocol is devised that is autonomous and does not require trustworthy neighbours. Importance Of Neighbor Position Update An ad hoc network is the collection of wireless mobile hosts forming a temporary without the aid of any established infrastructure or centralized administration. In such an environment , it is necessary for one mobile host to enlist the aid of other hosts in forwarding packet to its destination, due to the limited range of each mobile host’s wireless transmissions. In order to procure the position of other nodes while moving, an approach is proposed such a way that it helps in obtaining the position of dynamic mobile node. This paper presents a protocol for updating the position of node in RESEARCH ARTICLE OPEN ACCESS
  • 2. Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10 www.ijera.com 7 | P a g e dynamic ad hoc networks. The protocol adapts quickly to position changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. OVERVIEW The presented a distributed solution for NPV, which allows any node in mobile ad hoc network to verify the position of its communication neighbor without relying on priori trust worthy nodes. The analysis showed that the protocol is very robust to attacks by independent as well as colluding adversaries, even when they have perfect knowledge of the neighbourhood of the verifier. simulation results confirm that the solutions is effective in identifying nodes advertising false positions, while keeping the probability of false positions, while keeping the probability of false positives low. Only an overwhelming presence of colluding adversaries in the neighbourhood of the verifier, or the unlikely presence of fully collinear network topologies, can degrade the effectiveness of our NPV. Future work will aim at integrating the protocols, as well as at extending it to proactive paradigm, useful in presence of applications that position of the neighbours. PROBLEM STATEMENT This deal with a mobile ad hoc network, where a pervasive infrastructure is not present, and the location data must be obtained through node-to- node communication. Such a scenario is of particular interest since it leaves the door open for adversarial nodes to misuse or disrupt the location based services. II. EXISTING SYSTEM In existing methodology, a fully distributed cooperative scheme for NPV, which enables a source node, to discover and verify the position of its communication neighbours. For clarity, here we summarize the principles of route discovery and position verification process. A source node, S can initiate the protocol at any time instant, by triggering the 4-step message exchange process [POLL, REPLY,REVEAL and REPORT ], after completing the message exchange process, source node S has derives distance range of neighbour nodes to discover the shortest path to reach destination, after route discovery S runs several position verification tests in order to classify each candidate neighbour as either VERIFIED, FAULTY, UNVERFIABLE. Clearly , the verification tests aim at avoiding false negatives(i.e..adversaries announcing fake positions that are deemed verified) and false positives (i.e., correct nodes whose positions are deemed faulty),as well as at minimizing the number of unverifiable nodes. we remark that our NPV scheme does not target the creation of a consistent “map” of neighbourhood relations throughout an ephemeral network: rather, it allows the verifier to independently classify its neighbours. Figure2.Messages Exchange Process EXISTING SYSTEM METHODOLOGY POLL message A verifier S initiates this message. This message is anonymous. The identity of the verifier is kept hidden. Here software generated MAC address is used. This carries a public key K’S chosen from a pool of onetime use keys of S’. REPLY message A communication neighbor X receiving the POLL message will broadcast REPLY message after a time interval with a freshly generated MAC address. This also internally saves the transmission time. This also contains some encrypted message with S public key (K’S). This message is called as commitment of XCX. REVEAL message The REVEAL message is broadcasted using verifier’s real MAC address. It contains A map MS, a proof that S is the author of the original POLL and the verifier identity, i.e., its certified public key and signature. REPORT message The REPORT carries X’s position, the transmission time of X’s REPLY, and the list of pairs of reception times and temporary identifiers referring to REPLY broadcasts X received. The identifiers are obtained from the map MS included in the REVEAL message. Also, X discloses its own identity by including in the message its digital signature and certified public key. The node position verification is not suitable for dynamic environment, since mobile nodes are in dynamic in nature, so each and every schedule the mobile nodes undergoes position verification test, thus results in delay time of packet delivery ratio. III. PROPOSED SYSTEM In proposed system the NPV protocol is extended to dynamic source configuration routing protocol, which results in mobile node verification
  • 3. Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10 www.ijera.com 8 | P a g e instead of node position verification. The node position verification achieved through hash function, which states that if source node wants to verify the neighbor nodes the source S generates a hash id through hash function H(n)=PUB_KEY/IDENTITY, the public key and id of source node generates hash id. In the same way the neighbor nodes generates hash id are same then the nodes are authenticated for data transmission through the minimum distance range discovered path to destination. The proposed technique works in all kinds of environment and provides a secure data transmission and also decreases the time delay, improves the PDR, and throughput rate in network performance. Proposed Algorithm Implementation MD5 (MESSAGE-DIGEST ALGORITHM) is a widely used cryptographic function with a 128- bit hash value. MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32-digit hexadecimal number. IV. SYSTEM MODEL Node Configuration Setting The mobile nodes are designed and configured dynamically, designed to employ across the network, the nodes are set according to the X, Y, Z dimension, which the nodes have the direct transmission range to all other nodes. Nodes Unique Identity All the mobile nodes tend to have a unique id for its identification process, since the mobile nodes communicates with other nodes through its own network id. If any mobile node opted out of the network then the particular node should surrender its network id to the head node. Message exchange process for route discovery This module states a 4 step message exchange process i.e. POLL, REPLY, REVEAL, and REPORT. As soon the protocol executed the, POLL and REPLY messages are first broadcasted by Source and its neighbors, respectively. These messages are anonymous and take advantage of the broadcast nature of the wireless medium, allowing nodes to record reciprocal timing information without disclosing their identities. Distance Computation In order to compute the distance range, after a POLL and REPLY message a REVEAL message broadcast by the source nodes disclose to S, through secure and authenticated REPORT messages, their identities as well as the anonymous timing information they collected. The source S uses such data to match timings and identities; then, it uses the timings to perform To F-based ranging and compute distances between all pairs of communicating nodes in its neighborhood. Node Position Verification Once Source node has derived such distances, it runs several position verification tests in order to classify each candidate neighbor as either: Verified node, i.e., a node the verifier deems to be at the claimed position or Faulty node, i.e., a node the verifier deems to have announced an incorrect position or Unverifiable node, i.e., a node the verifier cannot prove to be either correct or faulty, due to insufficient information. The position verification is performed by direct symmetric test, cross symmetry test and multilateration test.
  • 4. Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10 www.ijera.com 9 | P a g e Node Verification Process In this module a proposed work of node verification technique is introduced to detect the adversary nodes in the network. The node verification is done by hash function technique the public key and id of source node generates hash id. In the same way the neighbor nodes generate the hash id, if the source node hash id and neighbor node hash id are same then the nodes are authenticated for data transmission through the minimum distance range discovered path to destination. Routing Algorithms Most QoS routing algorithms represent an extension of existing classic best-effort routing algorithms. Many routing protocols have been developed which support establishing and maintaining multi-hop routes between nodes in MANETs. These algorithms can be classified into two different categories: on-demand (reactive) such as DSR, AODV, and TORA, and table-driven (proactive) such as Destination Sequenced Distance Vector protocol (DSDV). In the on-demand protocols, routes are discovered between a source and a destination only when the need arises to send data. This provides a reduced overhead of communication and scalability. In the table-driven protocols, routing tables which contain routing information between all nodes are generated and maintained continuously regardless of the need of any given node to communicate at that time. With this approach, the latency for route acquisition is relatively small, which might be necessary for certain applications, but the cost of communications overhead incurred in the continued update of information for routes which might not be used for a long time if at all is too high. DSR - Dynamic Source Routing Protocol DSR is one of the most well known routing algorithms for ad hoc wireless networks. It was originally developed by Johnson, Maltz, and Broch. DSR uses source routing, which allows packet routing to be loop free. It increases its efficiency by allowing nodes that are either forwarding route discovery requests or overhearing packets through promiscuous listening mode to cache the routing information for future use. DSR is also on demand, which reduces the bandwidth use especially in situations where the mobility is low. It is a simple and efficient routing protocol for use in ad hoc networks. It has two important phases, route discovery and route maintenance. V. CONCLUSION Techniques for finding neighbors effectively in a non priori trusted environment are identified. The proposed techniques will eventually provide security from malicious nodes. The protocol is robust to adversarial attacks. This protocol will also update the position of the nodes in an active environment. The performance of the proposed scheme will be effective one. REFERENCES [1] Marco Fiore,Claudio Ettore Casetti and Panagioties papadimitratos “ Discovery And Verification Of Neighbor Position In Mobile Ad Hoc Networks”, Members IEEE,feb 2013 [2] R. Maheshwari, J. Gao, and S. Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” Proc. IEEE INFOCOM, Apr. 2007. [3] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, “Secure Vehicular Communications: Design and Architecture,” IEEE Comm. Magazine, vol. 46, no. 11, pp. 100- 109, Nov. 2008. [4] P. Papadimitratos and A. Jovanovic, “GNSS- Based Positioning: Attacks and Countermeasures,” Proc. IEEE Military Comm. Conf. (MILCOM), Nov. 2008. [5] R. Poovendran and L. Lazos, “A Graph Theoretic Framework for Preventing the Wormhole Attack,” Wireless Networks, vol. 13,pp. 27-59, 2007. [6] S. Capkun, K. Rasmussen, M. Cagalj, and M. Srivastava, “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Trans. Mobile Computing, vol. 7, no. 4, pp. 470-483, Apr. 2008. [7] R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux,“A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks,” Proc. Second ACM Conf. Wireless Network Security (WiSec), Mar. 2009. [8] P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J.-P. Hubaux, “Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networks,” IEEE Comm. Magazine, vol. 46, no. 2, pp. 132-139, Feb. 2008. [9] M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, “Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility,” Proc. ACM Symp. Information, Computer and Comm.Security (ASIACCS), Mar. 2008 [10] M. Poturalksi, P. Papadimitratos, and J.-P. Hubaux, “Towards Provable Secure Neighbor Discovery in Wireless Networks,” Proc. Workshop Formal Methods in Security Eng., Oct.2008.
  • 5. Anitha. M et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 4), March 2014, pp.06-10 www.ijera.com 10 | P a g e Anitha.M has obtained her BE degree in Electronics and Communication Engineering from Sengunthar college of Engineering, Tiruchencode in 2012. Currently she is doing her ME in Applied Electronics at Jayam College of Engineering and Technology, Dharmapuri. Presently she is involving in developing a advanced security method for data transmission in mobile ad hoc networks. She has published more than two research papers in national and international conferences. Her special areas of interest are networking, mobile computing and digital electronics. Surya.R.M has obtained her BE degree in Electronics and Communication Engineering from Paavai Engineering College. She received her ME degree in Applied Electronics from Jayam College of Engineering and Technology. She published more than six research papers in various national and international conferences/journals. At present She is working as Assistant Professor in the department of Electronics and Communication Engineering in Jayam College of Engineering and Technology. She has participated in various national level workshops and seminars at various colleges.