Skip to main content

2015 | OriginalPaper | Buchkapitel

Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks

verfasst von : Jeril Kuriakose, V. Amruth, R. Vikram Raju

Erschienen in: Security in Computing and Communications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

MANETs has become a broad area in wireless networks, because of its reduced deployment cost, ease of use, and deliverance from wires. MANETs uses a decentralized and infrastructure-less network, thus making the nodes to route its messages / data with the help of intermediate nodes. Routing in MANETs is carried out with the help of broadcasting schemes, among which MPR is found to be the effectual and uncomplicated scheme. The MPR scheme broadcasts its messages only to the selected MPR nodes. The selected MPR node may be any node in the network, and there are no obligatory and adequate conditions that provides assurance about the selected node’s integrity. In this paper, we have proposed a novel approach in the MPR node selection, by adding a security feature prior to the MPR node selection. We have verified the time constraints and efficiency with the help of localization techniques. Future events are also been discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)CrossRef Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)CrossRef
2.
Zurück zum Zitat Liang, O., Sekercioglu, Y.A., Mani, N.: A survey of multipoint relay based broadcast schemes in wireless ad hoc networks. IEEE Commun. Surv. Tutorials 8(4), 30–46 (2006)CrossRef Liang, O., Sekercioglu, Y.A., Mani, N.: A survey of multipoint relay based broadcast schemes in wireless ad hoc networks. IEEE Commun. Surv. Tutorials 8(4), 30–46 (2006)CrossRef
3.
Zurück zum Zitat Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking & Computing, pp. 194–205. ACM (2002) Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking & Computing, pp. 194–205. ACM (2002)
4.
Zurück zum Zitat Kuriakose, J., Joshi, S., Raju, R.V., Kilaru, A.: A review on localization in wireless sensor networks. In: Thampi, S.M., Gelbukh, A., Mukhopadhyay, J. (eds.) Advances in Signal Processing and Intelligent Recognition Systems, pp. 599–610. Springer, Heidelberg (2014)CrossRef Kuriakose, J., Joshi, S., Raju, R.V., Kilaru, A.: A review on localization in wireless sensor networks. In: Thampi, S.M., Gelbukh, A., Mukhopadhyay, J. (eds.) Advances in Signal Processing and Intelligent Recognition Systems, pp. 599–610. Springer, Heidelberg (2014)CrossRef
5.
Zurück zum Zitat Misra, P., Enge, P.: Global Positioning System: Signals, Measurements and Performance, 2nd edn. Ganga-Jamuna Press, Lincoln (2006) Misra, P., Enge, P.: Global Positioning System: Signals, Measurements and Performance, 2nd edn. Ganga-Jamuna Press, Lincoln (2006)
6.
Zurück zum Zitat Kuriakose, J., Amruth, V., Sandesh, A.G., Abhilash, V., Kumar, G.P., Nithin, K.: A review on mobile sensor localization. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 30–44. Springer, Heidelberg (2014) Kuriakose, J., Amruth, V., Sandesh, A.G., Abhilash, V., Kumar, G.P., Nithin, K.: A review on mobile sensor localization. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 30–44. Springer, Heidelberg (2014)
7.
Zurück zum Zitat Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002) CrossRef Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002) CrossRef
8.
Zurück zum Zitat Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96–97. ACM (2004) Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96–97. ACM (2004)
9.
Zurück zum Zitat Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)CrossRef Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)CrossRef
10.
Zurück zum Zitat Viani, F., Lizzi, L., Rocca, P., Benedetti, M., Donelli, M., Massa, A.: Object tracking through rssi measurements in wireless sensor networks. Electron. Lett. 44(10), 653–654 (2008)CrossRef Viani, F., Lizzi, L., Rocca, P., Benedetti, M., Donelli, M., Massa, A.: Object tracking through rssi measurements in wireless sensor networks. Electron. Lett. 44(10), 653–654 (2008)CrossRef
11.
Zurück zum Zitat Cheung, K.W., So, H.-C., Ma, W.-K., Chan, Y.-T.: Least squares algorithms for time-of-arrival-based mobile location. IEEE Trans. Sig. Process. 52(4), 1121–1130 (2004)MathSciNetCrossRef Cheung, K.W., So, H.-C., Ma, W.-K., Chan, Y.-T.: Least squares algorithms for time-of-arrival-based mobile location. IEEE Trans. Sig. Process. 52(4), 1121–1130 (2004)MathSciNetCrossRef
12.
Zurück zum Zitat Gardner, W.A., Chen, C.-K.: Signal-selective time-difference-of-arrival estimation for passive location of man-made signal sources in highly corruptive environments. i. theory and method. IEEE Trans, Sig. Process. 40(5), 1168–1184 (1992)CrossRefMATH Gardner, W.A., Chen, C.-K.: Signal-selective time-difference-of-arrival estimation for passive location of man-made signal sources in highly corruptive environments. i. theory and method. IEEE Trans, Sig. Process. 40(5), 1168–1184 (1992)CrossRefMATH
13.
Zurück zum Zitat Wang, D., Li, P., Hu, P., Xing, K., Wang, Y., Huang, L., Rong, Y.: On the performance of TDD and LDD based clone attack detection in mobile ad hoc networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 532–539. Springer, Heidelberg (2012) CrossRef Wang, D., Li, P., Hu, P., Xing, K., Wang, Y., Huang, L., Rong, Y.: On the performance of TDD and LDD based clone attack detection in mobile ad hoc networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 532–539. Springer, Heidelberg (2012) CrossRef
14.
Zurück zum Zitat Kuriakose, J., Sisodia, P.S., Amruth, V., Kumar, A., Sushanth, K.J., et al.: A comparative analysis of mobile localization and its attacks. In: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, p. 3. ACM (2014) Kuriakose, J., Sisodia, P.S., Amruth, V., Kumar, A., Sushanth, K.J., et al.: A comparative analysis of mobile localization and its attacks. In: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, p. 3. ACM (2014)
Metadaten
Titel
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks
verfasst von
Jeril Kuriakose
V. Amruth
R. Vikram Raju
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_37