SlideShare a Scribd company logo
1 of 4
Download to read offline
International 
OPEN ACCESS Journal 
Of Modern Engineering Research (IJMER) 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 37| 
A Distributed Approach for Neighbor Position Verification in MANETs Mahendranath Chowdry Kundla1, Kancharla Kalpana2 1 M. Tech (CSE), MVR College of Engineering and Technology, A.P., India. 2Asst. Professor, Dept. of Computer Science & Engineering, MVR College of Engineering and Technology, A.P., India. 
I. INTRODUCTION 
Mobile adhoc networks (MANET) [1] is a popular technology the world society speaks about due to the technology development. The modern world uses internet technology for everything as a part of their life, and now a day they use mobile technology in place of information technology to get access to the location based service. The kind of sophisticated service increases with the risk rate in accessing the service. The service providers have more challenges in providing the services and maintaining the quality of service parameters. A mobile network is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the wireless network topology may change rapidly and unpredictably over time. The MANET network is decentralized; where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves. The verification of the node locations is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In order to find out the neighbor nodes and verify them various techniques are proposed. Neighbour discovery deals with the identification of neighboring nodes with which a communication link can be established or that are within a given distance. An adversarial node could be securely discovered as neighbour node and be indeed a neighbour (within some range), but it could still cheat about its position within the same range. In other words, secure neighbor discovery lets a node assess whether another node is an actual neighbour but it does not verify the location it claims to be at .this is most often employed to counter wormhole attacks. Figure1 shows an example of topological information stored by verifier S at the end of the message exchange and effect of a fake position announcement by M. 
Abstract: Mobile Ad Hoc Network(MANET) is a kind of wireless network where you can find number of base stations which supports the communication of mobile nodes. The mobile node supports the routing process of the communication to improve the throughput of the overall network. The mobile nodes are moving at some speed and towards the direction, which makes the topology of the wireless network gets changing at every fraction of time. Due to this reason there will be number of nodes comes into the coverage area of a base station and leaves, which cannot be trusted for service handling. What the adversary does here is that it replies with the route discovery phase using fake location information with the intension to get participate in the routing process. After gets selected it simply discard the packets received, or manipulate the packets, or else it will never receive the packets because of the false location. This makes the transmission as a failure one and service throughput degrades automatically. Location Based Services are one, which is provided and accessed based on the location content. In a road traffic network the location based service can be accessed in various ways. The routing in the road network becomes more complicated due to the increase in mobile nodes. A mobile node can access a service to know about the traffic and the route to reach a destination by accessing the location based service. The correctness of the node locations is therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. This paper presents a protocol for updating the position of the node in dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is frequent, yet requires little or no overhead during the periods in which hosts move less frequently. 
Keywords: CST, DST, MANET, Neighbor discovery, NPV.
A Distributed Approach for Neighbor Position Verification in MANETs 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 38| 
Fig.1: Neighbor discovery in adversarial environment 
Neighbor verification [2] schemes often rely on fixed or mobile trustworthy nodes, which are assumed 
to be always available for the verification of the neighbor positions announced by third parties. In mobile ad 
hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be 
aprioristically trusted is quite unrealistic. Thus, a protocol is devised that is autonomous and does not require 
the trustworthy neighbours. A mobile ad hoc network is the collection of wireless mobile hosts forming a 
temporary network without the aid of any established infrastructure or centralized administration. In such an 
environment, it is necessary for one mobile node to enlist the aid of other hosts in forwarding a packet to its 
destination, due to the limited range of each mobile node’s wireless transmissions. In order to procure the 
position of other nodes while moving, an approach is proposed such a way that it helps in obtaining the 
position of a dynamic mobile node. This paper presents a protocol for updating the position of the node in 
dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is 
frequent, yet requires little or no overhead during the periods in which hosts move less frequently. 
II. RELATED WORK 
In [3] , the authors propose an Adaptive Hello Messaging Scheme for Neighbor Discovery in On- 
Demand MANET Routing Protocols. The authors present an adaptive Hello messaging scheme to suppress 
unnecessary Hello messages without reduced detectability of the broken links. Simulation results show that the 
proposed method reduces energy consumption and the network overhead without any explicit difference in 
throughput. In [4], the authors propose Dynamic Neighbor Positioning In Manet with Protection against 
Adversarial Attacks. The authors present techniques for finding neighbours effectively in a non priori trusted 
environment are identified. These techniques will eventually provide security from attacker nodes. The 
protocol is robust to malicious attacks. This protocol will also update the position of the mobile nodes in an 
active environment. The performance of the proposed method will be effective one. 
In [5], the authors propose Neighbor node discovery and Trust prediction in MANETs. This paper 
uses the directional antenna algorithm known as scanning based direct discovery algorithm to discover the 
neighbour nodes. To enable the cooperative working of the various distributed protocols we use trust system to 
provide the trust level of various mobile nodes, thereby enhancing the cooperation among the nodes. This 
paper uses the distributed hybrid trust algorithm and also uses relationship maturity concept to compute the 
trust of the mobile nodes. This paper demonstrates that Trust systems are better than already existing 
encryption techniques. For the discovery of mobile nodes [6], the authors explored the various attacks possible 
in the physical and communication medium of the MANETs. The authors classified the neighbor discovery as 
physical and communication neighbor discovery. Protocols aiming at communication neighbour discovery, 
which are based on physical discovery protocols, often fail to achieve their objective. This is because that these 
two types of discovery are not equivalent. At the same time, the protocols for communication neighbour 
discovery do not fully address the problem at hand. They are very effective only under very specific operational 
conditions or they do not ensure correctness in all cases.
A Distributed Approach for Neighbor Position Verification in MANETs 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 39| 
For the verification of Neighbor position [7] [8], there are techniques that was studied in the context of mobile ad hoc and sensor networks; however, existing Neighbor Position Verification schemes often rely on traditional or mobile trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In mobile ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. 
III. PROPOSED WORK 
In this paper we propose a fully distributed cooperative scheme for neighbor position verification (NPV), which enables a node, hereinafter called the verifier, to discover and verify the position of its communication neighbors. 1. NPV Protocol The proposed NPV protocol is designed for spontaneous mobile ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes. This protocol leverages cooperation but allows a node to perform all verification procedures autonomously. This method has no need for lengthy interactions, e.g., to reach a consensus among multiple mobile nodes, making our scheme suitable for both low and high mobility environments. It is reactive, meaning that it can be executed by any mobile node, at any point in time, without prior knowledge of the neighborhood. It is robust against independent and colluding attacks. It is lightweight, as it generates low overhead routing traffic. Algorithm 1: Step 1: node S do Step 2: S ->* : (POLL, K’s) Step 3: S : store ts Step 4: When receive REPLY from X E Step 5: S : store txs, cx Step 6: after Tmax + Tjitter do Step 7: S : ms={(cx, ix)/txs)} 2. Direct Symmetry Test The Direct Symmetry Test(DST) verifies the direct links with its communication neighbor nodes. To this end, DST checks whether reciprocal to F-derived distances are consistent with each other and with the position advertised by the neighbor node and with a proximity range. The latter corresponds to the maximum nominal transmission range, and upper bounds the distance at which the two nodes can communicate. Algorithm 2: Step 1: node S do Step 2: S: Fs<-0 Step 3: For all X E Ns do Step 4: If dsx – dxs > 2 or Step 5: ps – px / - dxs > 2 or Step 6: dsx > R then Step 7: S:Fs<-X 3. Cross Symmetry Test The cross symmetry test(CST) ignores nodes already declared as faulty by the DST and only considers mobile nodes that proved to be communication neighbor nodes between each other, i.e., for which To F derived mutual distances are available. However, pairs of neighbor nodes declaring collinear positions with respect to S are not taken into account. This choice makes our NPV robust to attacks in many particular situations. For all other pair the cross test verifies the symmetry of the reciprocal distances and their consistency with the positions declared by the neighbor nodes and with the proximity range. For each neighbor maintains a link counter and a mismatch counter. The former is incremented at every new crosscheck on X, and records the number of communication links between neighbor and other neighbors. The latter is incremented every time at least one of the cross-checks on distance and the position fails and identifies the potential for neighbor being faulty.
A Distributed Approach for Neighbor Position Verification in MANETs 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 40| 
Algorithm 3: Step 1: node S do Step 2: S:Us<- 0, Ws<- 0 Step 3: For all X E Ns, X E Fs do Step 4: if dxy , dyx and Step 5: Ps E line(px , py) Step 6: S:lx=lx+1, ly=ly+1 Step 7: If dxy-dyx > 2x+e or Step 8: dxy > R then Step 9: S: mx=mx+1. 
IV. CONCLUSION 
In mobile ad hoc networks(MANETs), position aided routing protocols can offer a significant performance increase over fixed ad hoc routing protocols. As position information is broadcasted including the attacker to receive. Routes may be disconnected due to the dynamic movement of mobile nodes. Such mobile networks are more vulnerable to both internal and external attacks due to presence of the attacker nodes. These mobile nodes affect the performance of the routing protocol in ad hoc networks. So it is essential to identify the neighbor nodes in MANET. The Neighbor Position Verification (NPV) is a routing protocol designed to protect the wireless network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in ad hoc network routing. 
REFERENCES 
[1] Chansu Yu, y Ben Lee , Hee Yong Youn, ”Energy Efficient routing protocols for mobile ad hoc networks”, Wireless Communications and Mobile Computing, John Wiley & Sons, Ltd, PP-959–973, 2003. [2] E. Ekici, S. Vural, J. McNair, and D. Al-Abri, “Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 2, pp. 195-209, 2008. [3] Seon Yeong Han, 2013. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols, IEEE Transactions on communication, 17(5): 1040-1043. [4] Priyadarshani, K., 2013. Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks, IJCER, 3(4). [5] Thilagavathy, S., 2013. Neighbor node discovery and Trust prediction in manets, International Journal of Science, Engineering and Technology Research (IJSETR), 2(1). [6] Poturalksi, M., P. Papadimitratos and J.P. Hubaux, 2008. “Towards Provable Secure Neighbor Discovery in Wireless Networks,” Proc. Workshop Formal Methods in Security Eng. [7] Chiang, J., J. Haas and Y. Hu, 2009. “Secure and PreciseLocation Verification Using Distance Bounding and Simultaneous Multilateration,” Proc. Second ACM Conf. Wireless Network Security (WiSec). [8] Capkun, S., K. Rasmussen, M. Cagalj and M. Srivastava, 2008. “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Trans. Mobile Computing, 7(4): 470-483.

More Related Content

Viewers also liked

Ijmer 46043741
Ijmer 46043741Ijmer 46043741
Ijmer 46043741
IJMER
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
IJMER
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
IJMER
 
Cz3210711074
Cz3210711074Cz3210711074
Cz3210711074
IJMER
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
IJMER
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
IJMER
 
B04010 03 0914
B04010 03 0914B04010 03 0914
B04010 03 0914
IJMER
 

Viewers also liked (20)

Ijmer 46043741
Ijmer 46043741Ijmer 46043741
Ijmer 46043741
 
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic EnclosureCFD Analysis of Heat Transfer and Flow Characteristics in A 3D  Cubic Enclosure
CFD Analysis of Heat Transfer and Flow Characteristics in A 3D Cubic Enclosure
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
Strong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision PurposeStrong Image Alignment for Meddling Recognision Purpose
Strong Image Alignment for Meddling Recognision Purpose
 
Cz3210711074
Cz3210711074Cz3210711074
Cz3210711074
 
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...
Enhance Example-Based Super Resolution to Achieve Fine  Magnification of Low ...Enhance Example-Based Super Resolution to Achieve Fine  Magnification of Low ...
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...
 
Safety Margin of Slope Stability Using Common Deterministic Methods
Safety Margin of Slope Stability Using Common Deterministic  MethodsSafety Margin of Slope Stability Using Common Deterministic  Methods
Safety Margin of Slope Stability Using Common Deterministic Methods
 
Efficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar EnergyEfficient Energy Management System with Solar Energy
Efficient Energy Management System with Solar Energy
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
 
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
Propabilistic Analysis of a Man-Machine System Operating Subject To Different...
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
On The Transcendental Equation
On The Transcendental EquationOn The Transcendental Equation
On The Transcendental Equation
 
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
Parametric Study for Wind Design of Vertical Pressure Vessel as per Indian St...
 
Vibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case StudyVibrational Analysis a Key for Pump Maintenance-Case Study
Vibrational Analysis a Key for Pump Maintenance-Case Study
 
An Analytical Study of International Standards on Minority Rights
An Analytical Study of International Standards on Minority  Rights An Analytical Study of International Standards on Minority  Rights
An Analytical Study of International Standards on Minority Rights
 
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
Evaluation of Total Productive Maintenance Implementation in a Selected Semi-...
 
Fatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactorFatigue Analysis of Acetylene converter reactor
Fatigue Analysis of Acetylene converter reactor
 
B04010 03 0914
B04010 03 0914B04010 03 0914
B04010 03 0914
 
3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition3D Median Filter Design for Iris Recognition
3D Median Filter Design for Iris Recognition
 

More from IJMER

Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
Sampad Kar
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 

Recently uploaded (20)

"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
Electrical shop management system project report.pdf
Electrical shop management system project report.pdfElectrical shop management system project report.pdf
Electrical shop management system project report.pdf
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Introduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of ArduinoIntroduction to Arduino Programming: Features of Arduino
Introduction to Arduino Programming: Features of Arduino
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 

A Distributed Approach for Neighbor Position Verification in MANETs

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 37| A Distributed Approach for Neighbor Position Verification in MANETs Mahendranath Chowdry Kundla1, Kancharla Kalpana2 1 M. Tech (CSE), MVR College of Engineering and Technology, A.P., India. 2Asst. Professor, Dept. of Computer Science & Engineering, MVR College of Engineering and Technology, A.P., India. I. INTRODUCTION Mobile adhoc networks (MANET) [1] is a popular technology the world society speaks about due to the technology development. The modern world uses internet technology for everything as a part of their life, and now a day they use mobile technology in place of information technology to get access to the location based service. The kind of sophisticated service increases with the risk rate in accessing the service. The service providers have more challenges in providing the services and maintaining the quality of service parameters. A mobile network is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the wireless network topology may change rapidly and unpredictably over time. The MANET network is decentralized; where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves. The verification of the node locations is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In order to find out the neighbor nodes and verify them various techniques are proposed. Neighbour discovery deals with the identification of neighboring nodes with which a communication link can be established or that are within a given distance. An adversarial node could be securely discovered as neighbour node and be indeed a neighbour (within some range), but it could still cheat about its position within the same range. In other words, secure neighbor discovery lets a node assess whether another node is an actual neighbour but it does not verify the location it claims to be at .this is most often employed to counter wormhole attacks. Figure1 shows an example of topological information stored by verifier S at the end of the message exchange and effect of a fake position announcement by M. Abstract: Mobile Ad Hoc Network(MANET) is a kind of wireless network where you can find number of base stations which supports the communication of mobile nodes. The mobile node supports the routing process of the communication to improve the throughput of the overall network. The mobile nodes are moving at some speed and towards the direction, which makes the topology of the wireless network gets changing at every fraction of time. Due to this reason there will be number of nodes comes into the coverage area of a base station and leaves, which cannot be trusted for service handling. What the adversary does here is that it replies with the route discovery phase using fake location information with the intension to get participate in the routing process. After gets selected it simply discard the packets received, or manipulate the packets, or else it will never receive the packets because of the false location. This makes the transmission as a failure one and service throughput degrades automatically. Location Based Services are one, which is provided and accessed based on the location content. In a road traffic network the location based service can be accessed in various ways. The routing in the road network becomes more complicated due to the increase in mobile nodes. A mobile node can access a service to know about the traffic and the route to reach a destination by accessing the location based service. The correctness of the node locations is therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. This paper presents a protocol for updating the position of the node in dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is frequent, yet requires little or no overhead during the periods in which hosts move less frequently. Keywords: CST, DST, MANET, Neighbor discovery, NPV.
  • 2. A Distributed Approach for Neighbor Position Verification in MANETs | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 38| Fig.1: Neighbor discovery in adversarial environment Neighbor verification [2] schemes often rely on fixed or mobile trustworthy nodes, which are assumed to be always available for the verification of the neighbor positions announced by third parties. In mobile ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. Thus, a protocol is devised that is autonomous and does not require the trustworthy neighbours. A mobile ad hoc network is the collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it is necessary for one mobile node to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile node’s wireless transmissions. In order to procure the position of other nodes while moving, an approach is proposed such a way that it helps in obtaining the position of a dynamic mobile node. This paper presents a protocol for updating the position of the node in dynamic mobile ad hoc networks. The protocol adapts quickly to position changes when node movement is frequent, yet requires little or no overhead during the periods in which hosts move less frequently. II. RELATED WORK In [3] , the authors propose an Adaptive Hello Messaging Scheme for Neighbor Discovery in On- Demand MANET Routing Protocols. The authors present an adaptive Hello messaging scheme to suppress unnecessary Hello messages without reduced detectability of the broken links. Simulation results show that the proposed method reduces energy consumption and the network overhead without any explicit difference in throughput. In [4], the authors propose Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks. The authors present techniques for finding neighbours effectively in a non priori trusted environment are identified. These techniques will eventually provide security from attacker nodes. The protocol is robust to malicious attacks. This protocol will also update the position of the mobile nodes in an active environment. The performance of the proposed method will be effective one. In [5], the authors propose Neighbor node discovery and Trust prediction in MANETs. This paper uses the directional antenna algorithm known as scanning based direct discovery algorithm to discover the neighbour nodes. To enable the cooperative working of the various distributed protocols we use trust system to provide the trust level of various mobile nodes, thereby enhancing the cooperation among the nodes. This paper uses the distributed hybrid trust algorithm and also uses relationship maturity concept to compute the trust of the mobile nodes. This paper demonstrates that Trust systems are better than already existing encryption techniques. For the discovery of mobile nodes [6], the authors explored the various attacks possible in the physical and communication medium of the MANETs. The authors classified the neighbor discovery as physical and communication neighbor discovery. Protocols aiming at communication neighbour discovery, which are based on physical discovery protocols, often fail to achieve their objective. This is because that these two types of discovery are not equivalent. At the same time, the protocols for communication neighbour discovery do not fully address the problem at hand. They are very effective only under very specific operational conditions or they do not ensure correctness in all cases.
  • 3. A Distributed Approach for Neighbor Position Verification in MANETs | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 39| For the verification of Neighbor position [7] [8], there are techniques that was studied in the context of mobile ad hoc and sensor networks; however, existing Neighbor Position Verification schemes often rely on traditional or mobile trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In mobile ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. III. PROPOSED WORK In this paper we propose a fully distributed cooperative scheme for neighbor position verification (NPV), which enables a node, hereinafter called the verifier, to discover and verify the position of its communication neighbors. 1. NPV Protocol The proposed NPV protocol is designed for spontaneous mobile ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes. This protocol leverages cooperation but allows a node to perform all verification procedures autonomously. This method has no need for lengthy interactions, e.g., to reach a consensus among multiple mobile nodes, making our scheme suitable for both low and high mobility environments. It is reactive, meaning that it can be executed by any mobile node, at any point in time, without prior knowledge of the neighborhood. It is robust against independent and colluding attacks. It is lightweight, as it generates low overhead routing traffic. Algorithm 1: Step 1: node S do Step 2: S ->* : (POLL, K’s) Step 3: S : store ts Step 4: When receive REPLY from X E Step 5: S : store txs, cx Step 6: after Tmax + Tjitter do Step 7: S : ms={(cx, ix)/txs)} 2. Direct Symmetry Test The Direct Symmetry Test(DST) verifies the direct links with its communication neighbor nodes. To this end, DST checks whether reciprocal to F-derived distances are consistent with each other and with the position advertised by the neighbor node and with a proximity range. The latter corresponds to the maximum nominal transmission range, and upper bounds the distance at which the two nodes can communicate. Algorithm 2: Step 1: node S do Step 2: S: Fs<-0 Step 3: For all X E Ns do Step 4: If dsx – dxs > 2 or Step 5: ps – px / - dxs > 2 or Step 6: dsx > R then Step 7: S:Fs<-X 3. Cross Symmetry Test The cross symmetry test(CST) ignores nodes already declared as faulty by the DST and only considers mobile nodes that proved to be communication neighbor nodes between each other, i.e., for which To F derived mutual distances are available. However, pairs of neighbor nodes declaring collinear positions with respect to S are not taken into account. This choice makes our NPV robust to attacks in many particular situations. For all other pair the cross test verifies the symmetry of the reciprocal distances and their consistency with the positions declared by the neighbor nodes and with the proximity range. For each neighbor maintains a link counter and a mismatch counter. The former is incremented at every new crosscheck on X, and records the number of communication links between neighbor and other neighbors. The latter is incremented every time at least one of the cross-checks on distance and the position fails and identifies the potential for neighbor being faulty.
  • 4. A Distributed Approach for Neighbor Position Verification in MANETs | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.9| Sept. 2014 | 40| Algorithm 3: Step 1: node S do Step 2: S:Us<- 0, Ws<- 0 Step 3: For all X E Ns, X E Fs do Step 4: if dxy , dyx and Step 5: Ps E line(px , py) Step 6: S:lx=lx+1, ly=ly+1 Step 7: If dxy-dyx > 2x+e or Step 8: dxy > R then Step 9: S: mx=mx+1. IV. CONCLUSION In mobile ad hoc networks(MANETs), position aided routing protocols can offer a significant performance increase over fixed ad hoc routing protocols. As position information is broadcasted including the attacker to receive. Routes may be disconnected due to the dynamic movement of mobile nodes. Such mobile networks are more vulnerable to both internal and external attacks due to presence of the attacker nodes. These mobile nodes affect the performance of the routing protocol in ad hoc networks. So it is essential to identify the neighbor nodes in MANET. The Neighbor Position Verification (NPV) is a routing protocol designed to protect the wireless network from adversary nodes by verifying the position of neighbor nodes to improve security, efficiency and performance in ad hoc network routing. REFERENCES [1] Chansu Yu, y Ben Lee , Hee Yong Youn, ”Energy Efficient routing protocols for mobile ad hoc networks”, Wireless Communications and Mobile Computing, John Wiley & Sons, Ltd, PP-959–973, 2003. [2] E. Ekici, S. Vural, J. McNair, and D. Al-Abri, “Secure Probabilistic Location Verification in Randomly Deployed Wireless Sensor Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 2, pp. 195-209, 2008. [3] Seon Yeong Han, 2013. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols, IEEE Transactions on communication, 17(5): 1040-1043. [4] Priyadarshani, K., 2013. Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks, IJCER, 3(4). [5] Thilagavathy, S., 2013. Neighbor node discovery and Trust prediction in manets, International Journal of Science, Engineering and Technology Research (IJSETR), 2(1). [6] Poturalksi, M., P. Papadimitratos and J.P. Hubaux, 2008. “Towards Provable Secure Neighbor Discovery in Wireless Networks,” Proc. Workshop Formal Methods in Security Eng. [7] Chiang, J., J. Haas and Y. Hu, 2009. “Secure and PreciseLocation Verification Using Distance Bounding and Simultaneous Multilateration,” Proc. Second ACM Conf. Wireless Network Security (WiSec). [8] Capkun, S., K. Rasmussen, M. Cagalj and M. Srivastava, 2008. “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Trans. Mobile Computing, 7(4): 470-483.