Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4

Abstract

Abstract -In a mobile ad hoc network without knowing neighbor node position which makes a chance to attackers to easily enter into the network. A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated. Providing this protocol to a wireless ad hoc network makes it to be more secure. Results show that our protocol can determine attacks under the best possible conditions for the adversaries, with minimal false positive rates. Secure Neighbor Discovery which offers a measure of protection by allowing participating mobile nodes to securely determine if they are neighbors. Neighbor position verification designed for spontaneous ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes. The paper includes result of NPV protocols.

Authors and Affiliations

Keywords

Related Articles

Analyzing the Performance of Supply Chain using Topsis

Analyzing the Performance of Supply Chain using Topsis

Trace Elemental Analysis of Rice Samples from Kidney Effected Area Using EDXRF Technique

Rice samples are collected from different villages affected with chronic kidney disease (CKD) in Uddanam area of Srikakulam District, Andhra Pradesh,India. These samples are analyzed using Energy Dispersive X-ray Fluor...

Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images

Steganography is defined as an art of concealed data sharing for communication that prevents the detection of hidden messages. This paper presents a steganographic method based on modification of JPEG quantization table....

Comparison between Fuzzy and Not Fuzzy Portfolio Optimization under Downside Risk Measures

This paper presents two fuzzy portfolio selection models where the objective is to minimize the downside risk constrained so that a given expected return should be achieved. We assume that the rates of returns on securit...

Inheritance Study of Qualitative and Quantitative Traits in Cowpea (Vigna unguiculata (L.) Walp)

Two parents namely Konkan Sadabahar and Fodder cowpea-1 were used to study inheritance of four qualitative characters (i.e., growth habit, flower colour, seed coat colour and seed coat colour pattern) and four quantitati...

Download PDF file
  • EP ID EP367490
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

(2015). Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood. International Journal of Science and Research (IJSR), 4(4), -. https://europub.co.uk/articles/-A-367490