SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Computational Engineering Research||Vol, 03||Issue, 4||
www.ijceronline.com ||April||2013|| Page 262
Dynamic Neighbor Positioning In Manet with Protection against
Adversarial Attacks
1,
K. Priyadharshini , 2,
V. Kathiravan , 3,
S.Karthiga, 4,
A.Christopher Paul,
1,
UG Scholar,SNS College Of Technology, INDIA
4,
Assistant Professor, Department Of Computer Science And Engineering,,SNS College Of Technology, INDIA
I. INTRODUCTION
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth
constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and
unpredictably over time. The network is decentralized; where all network activity including discovering the
topology and delivering messages must be executed by the nodes themselves. The verification of node locations
is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries
aiming at harming the system. In order to find the neighbour nodes and verify them various techniques are
proposed.
1.1 Finding the position of a neighbour
Neighbour discovery deals with the identification of nodes with which a communication link can be
established or that are within a given distance. An adversarial node could be securely discovered as neighbour
and be indeed a neighbour (within some range), but it could still cheat about its position within the same range.
In other words, SND lets a node assess whether another node is an actual neighbour but it does not verify the
location it claims to be at .this is most often employed to counter wormhole attacks.
1.2 confirmation of claimed position
Neighbour verification schemes often rely on fixed or mobile trustworthy nodes, which are assumed to
be always available for the verification of the positions announced by third parties. In ad hoc environments,
however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is
quite unrealistic. Thus, a protocol is devised that is autonomous and does not require trustworthy neighbours.
Figure1: Neighbour discovery in adversarial environment
1.3 Importance of Neighbour position update
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any established infrastructure or centralized administration. In such an environment, it is necessary for
one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range
of each mobile host’s wireless transmissions. In order to procure the position of other nodes while moving, an
approach is proposed such a way that it helps in obtaining the position of a dynamic mobile node. This paper
presents a protocol for updating the position of a node in dynamic ad hoc networks. The protocol adapts quickly
to position changes when host movement is frequent, yet requires little or no overhead during periods in which
hosts move less frequently
II. PROPOSED WORK
Abstract
In Mobile Ad-Hoc Networks, Routes May Be Disconnected Due To Dynamic Movement Of
Nodes. Such Networks Are More Vulnerable To Both Internal And External Attacks Due To Presence Of
Adversarial Nodes. These Nodes Affect The Performance Of Routing Protocol In Ad-Hoc Networks. So,
It Is Essential To Identify The Neighbours In A MANET. The Proposed Scheme Identifies A Neighbour
And Verifies Its Position Effectively.
Dynamic Neighbor Positioning...
www.ijceronline.com ||April||2013|| Page 263
Nodes carry a unique identity and can authenticate messages of other nodes through public key
cryptography. In particular, it is assumed that each node X owns a private key, kX, and a public key, KX, as well
as a set of one-time use keys {k0X;K0X }. Nodes are correct if they comply with the NPV protocol, and
adversarial if they deviate from it.
2.1 Distributed cooperative NPV scheme
A node S is called as a verifier, which discovers and verifies the position of its communicating
neighbours. A verifier, S, can initiate the protocol at any time instant, by triggering the 4-step message
exchange. The aim of the message exchange is to let S collect information it can use to compute distances
between any pair of its communication neighbours. After the distances are calculated the nodes are classified as:
Verified: Node is in the claimed position.
Faulty: Node has announced an incorrect position.
Unverifiable: Insufficient information.
The verification tests aim at avoiding false negatives (i.e., adversaries announcing fake positions that are
deemed verified) and false positives (i.e., correct nodes whose positions are deemed faulty), as well as at
minimizing the number of unverifiable nodes. It also allows the verifier to independently classify its
neighbours.
2.2 NPV Protocol
This protocol exchanges messages and verify the position of communicating nodes. Here four set of
messages are exchanged they are:
• POLL message
• REPLY message
• REVEAL message
• REPORT message
POLL message
A verifier S initiates this message. This message is anonymous. The identity of the verifier is kept
hidden. Here software generated MAC address is used. This carries a public key K’
S chosen from a pool of
onetime use keys of S’.
REPLY message
A communication neighbour X receiving the POLL message will broadcast REPLY message after a time
interval with a freshly generated MAC address. This also internally saves the transmission time. This also
contains some encrypted message with S public key (K’
S). This message is called as commitment of X CX.
Figure 2: Message exchange
REVEAL message
The REVEAL message is broadcasted using Verifier’s real MAC address. It contains A map MS, a
proof that S is the author of the original POLL and the verifier identity, i.e., its certified public key and
signature.
REPORT message
The REPORT carries X’s position, the transmission time of X’s REPLY, and the list of pairs of
reception times and temporary identifiers referring to the REPLY broadcasts X received. The identifiers are
obtained from the map MS included in the REVEAL message. Also, X discloses its own identity by including in
the message its digital signature and certified public key.
2.3 Position verification
To verify the position of a node following three tests is done, they are:
Dynamic Neighbor Positioning...
www.ijceronline.com ||April||2013|| Page 264
 Direct symmetry test
 Cross symmetry test
 The Multilateration Test
In the Direct Symmetry Test, S verifies the direct links with its communication neighbours. To this end, it
checks whether reciprocal Time of Flight-derived distances are consistent with each other, with the position
advertised by the neighbour, and with a proximity range R.In cross symmetry test information mutually
gathered by each pair of communication neighbours are checked. This ignores nodes already declared as faulty
by the DST and only considers nodes that proved to be communication neighbours between each other, i.e., for
which ToF-derived mutual distances are available.In multilateration test, the unnotified links are tested. For
each neighbour X that did not notify about a link reported by another node Y, with X, Y € WS range. Once all
couples of nodes have been checked, each node X for which two or more unnotified links exist is considered as
suspect.
2.4 Dynamically updating neighbour position
The neighbour discovery protocol is based on nodes sending notification messages tagged with ID and
their current region whenever they enter or leave a region. In particular, there are three types of messages:
 Leave
 Join
 Join_reply.
Table 1
Summary of notations
Notation Description
F+
rcv Upper bound on a specific
message being delivered
F+
ack Upper bound on an
acknowledgment being
received
k Maximum size of the queue
t Initial time
When a node is about to move into a new region, it broadcasts a leave message some time before leaving. This
message indicates to its neighbouring nodes that they should begin tearing down the corresponding link if
appropriate.
Figure 3: Leave message exchange
When a node enters a new region and determines that it is going to remain there for sufficiently long, it
broadcasts a join message. This message indicates to the neighbours that they should start position verification
for the corresponding link. It also serves as a request to learn the ids of neighbours.
Dynamic Neighbor Positioning...
www.ijceronline.com ||April||2013|| Page 265
Figure 4: Join and join_reply message exchange
Nodes that receive a join message send a join_reply message in response so that the original node can learn
their ids. The timing of these messages ensures that the proper semantics of the corresponding links are
maintained. This means that the overhead for setting up and tearing down links is taken into account, and
reliable message delivery is guaranteed.
III. SYSTEM MODEL
From the figure 5, the overall flow of the system can be understood. The positioning of neighbours is
done and the nodes are classified. Later these positions that are claimed are verified. When a new node enters or
leave the range they are updated .while updating also the same verification processes are done.
Figure 5: System flow
IV. ROBUSTNESS ANALYSIS OF THE PROPOSED SYSTEM
A single independent adversary cannot perform any successful attack against the NPV scheme. When
the shared neighbourhood increases in size, the probability that the adversary is tagged as faulty rapidly grows
to 1. Multiple independent adversaries can only harm each other, thus reducing their probability of
successfully announcing a fake position. In coordinated attacks, it is the nature of the neighbourhood that
determines the performance of the NPV scheme in presence of colluders. However, in realistic environments,
our solution is very robust even to attacks launched by large groups of knowledgeable colluders. This system
yields small advantage to the adversaries in terms of displacement. Finally, the overhead introduced by the NPV
protocol is reasonable, as it does not exceed a few tens of Kbytes even in the most critical conditions.
V. CONCLUSION
Techniques for finding neighbours effectively in a non priori trusted environment are identified. The
proposed techniques will eventually provide security from malicious nodes. The protocol is robust to
adversarial attacks. This protocol will also update the position of the nodes in an active environment. The
performance of the proposed scheme will be effective one.
Dynamic Neighbor Positioning...
www.ijceronline.com ||April||2013|| Page 266
REFRENCES
[1] J.H. Song, V.Wong,and V.Leung,”Secure Location verification for Vechicular Ad-Hoc Networks,” Proc.IEEE
Globecom,Dec.2008 (adversarial environment).
[2] M.Poturalski,P.Papadimitratos, and J- P.Hubaux,”Secure Neighbor Discovery in Wireless Networks:Formal Investigation of
Possibility,” proc.ACM Symp.Information,Computer and comm Security (ASIACCS), Mar.2008(time based verification).
[3] P.Papadimitratos, M.Poturalski, P.Lafourcade, D.Basin,S.Capkum, and J-P,Hubaux, ”Secure Neighborhood Discovery:A
Fundamental Element for Mobile Ad-Hod Networks,” IEEE comm.Magazine,vol.46,no.2,pp.132-139,Feb.2008 (neighbor
discovery based on distance).
[4] R.Shoki, M.Poturalski, G.Ravot, P.Papadimitratos, and J-P.Hubaux,”A Partical Secure Neighbor Verification Protocol for
wireless Sensor Networks,”Proc. Second ACM Conf.Wireless Network Security (Wisec), Mar.2009 ( secure neighbor discovery)
.
[5] S.Capkun and J-P.Hubaux,”Secure Positioning in Wireless Networks,”IEEE J.Selected Areas in Comm.,Vol.24,pp.221-
232,Feb.2009 (triplet node verification).
[6] Marco Fiore, Claudio Ettore Casetti, Carla-Fabiana Chiasserini, Panagiotis Papadimitratos. “Discovery and Verification of
Neighbor Positions in Mobile Ad Hoc Networks”. ieee transactions on mobile computing, vol. 12, no. 2, february 2013.
[7] Alejandro Cornejo, Nancy Lynch, Saira Viqar, Jennifer L. Welch “Neighbor Discovery in Mobile Ad Hoc Networks Using an
Abstract MAC Layer” November 20, 2009.

Mais conteúdo relacionado

Mais procurados

Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolMehedi
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leachcsandit
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetIOSR Journals
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 

Mais procurados (12)

I1086066
I1086066I1086066
I1086066
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocol
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
AD HOC.doc
AD HOC.docAD HOC.doc
AD HOC.doc
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 
Preventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In ManetPreventing Malicious Node and Provide Secure Routing In Manet
Preventing Malicious Node and Provide Secure Routing In Manet
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 

Destaque

Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destaque (6)

Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a As03402620266

Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd Iaetsd
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksresearcherchennai
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIJERA Editor
 

Semelhante a As03402620266 (20)

Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
I1802046780
I1802046780I1802046780
I1802046780
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
I1086066
I1086066I1086066
I1086066
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

As03402620266

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 4|| www.ijceronline.com ||April||2013|| Page 262 Dynamic Neighbor Positioning In Manet with Protection against Adversarial Attacks 1, K. Priyadharshini , 2, V. Kathiravan , 3, S.Karthiga, 4, A.Christopher Paul, 1, UG Scholar,SNS College Of Technology, INDIA 4, Assistant Professor, Department Of Computer Science And Engineering,,SNS College Of Technology, INDIA I. INTRODUCTION A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized; where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves. The verification of node locations is an important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In order to find the neighbour nodes and verify them various techniques are proposed. 1.1 Finding the position of a neighbour Neighbour discovery deals with the identification of nodes with which a communication link can be established or that are within a given distance. An adversarial node could be securely discovered as neighbour and be indeed a neighbour (within some range), but it could still cheat about its position within the same range. In other words, SND lets a node assess whether another node is an actual neighbour but it does not verify the location it claims to be at .this is most often employed to counter wormhole attacks. 1.2 confirmation of claimed position Neighbour verification schemes often rely on fixed or mobile trustworthy nodes, which are assumed to be always available for the verification of the positions announced by third parties. In ad hoc environments, however, the pervasive presence of either infrastructure or neighbour nodes that can be aprioristically trusted is quite unrealistic. Thus, a protocol is devised that is autonomous and does not require trustworthy neighbours. Figure1: Neighbour discovery in adversarial environment 1.3 Importance of Neighbour position update An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it is necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. In order to procure the position of other nodes while moving, an approach is proposed such a way that it helps in obtaining the position of a dynamic mobile node. This paper presents a protocol for updating the position of a node in dynamic ad hoc networks. The protocol adapts quickly to position changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently II. PROPOSED WORK Abstract In Mobile Ad-Hoc Networks, Routes May Be Disconnected Due To Dynamic Movement Of Nodes. Such Networks Are More Vulnerable To Both Internal And External Attacks Due To Presence Of Adversarial Nodes. These Nodes Affect The Performance Of Routing Protocol In Ad-Hoc Networks. So, It Is Essential To Identify The Neighbours In A MANET. The Proposed Scheme Identifies A Neighbour And Verifies Its Position Effectively.
  • 2. Dynamic Neighbor Positioning... www.ijceronline.com ||April||2013|| Page 263 Nodes carry a unique identity and can authenticate messages of other nodes through public key cryptography. In particular, it is assumed that each node X owns a private key, kX, and a public key, KX, as well as a set of one-time use keys {k0X;K0X }. Nodes are correct if they comply with the NPV protocol, and adversarial if they deviate from it. 2.1 Distributed cooperative NPV scheme A node S is called as a verifier, which discovers and verifies the position of its communicating neighbours. A verifier, S, can initiate the protocol at any time instant, by triggering the 4-step message exchange. The aim of the message exchange is to let S collect information it can use to compute distances between any pair of its communication neighbours. After the distances are calculated the nodes are classified as: Verified: Node is in the claimed position. Faulty: Node has announced an incorrect position. Unverifiable: Insufficient information. The verification tests aim at avoiding false negatives (i.e., adversaries announcing fake positions that are deemed verified) and false positives (i.e., correct nodes whose positions are deemed faulty), as well as at minimizing the number of unverifiable nodes. It also allows the verifier to independently classify its neighbours. 2.2 NPV Protocol This protocol exchanges messages and verify the position of communicating nodes. Here four set of messages are exchanged they are: • POLL message • REPLY message • REVEAL message • REPORT message POLL message A verifier S initiates this message. This message is anonymous. The identity of the verifier is kept hidden. Here software generated MAC address is used. This carries a public key K’ S chosen from a pool of onetime use keys of S’. REPLY message A communication neighbour X receiving the POLL message will broadcast REPLY message after a time interval with a freshly generated MAC address. This also internally saves the transmission time. This also contains some encrypted message with S public key (K’ S). This message is called as commitment of X CX. Figure 2: Message exchange REVEAL message The REVEAL message is broadcasted using Verifier’s real MAC address. It contains A map MS, a proof that S is the author of the original POLL and the verifier identity, i.e., its certified public key and signature. REPORT message The REPORT carries X’s position, the transmission time of X’s REPLY, and the list of pairs of reception times and temporary identifiers referring to the REPLY broadcasts X received. The identifiers are obtained from the map MS included in the REVEAL message. Also, X discloses its own identity by including in the message its digital signature and certified public key. 2.3 Position verification To verify the position of a node following three tests is done, they are:
  • 3. Dynamic Neighbor Positioning... www.ijceronline.com ||April||2013|| Page 264  Direct symmetry test  Cross symmetry test  The Multilateration Test In the Direct Symmetry Test, S verifies the direct links with its communication neighbours. To this end, it checks whether reciprocal Time of Flight-derived distances are consistent with each other, with the position advertised by the neighbour, and with a proximity range R.In cross symmetry test information mutually gathered by each pair of communication neighbours are checked. This ignores nodes already declared as faulty by the DST and only considers nodes that proved to be communication neighbours between each other, i.e., for which ToF-derived mutual distances are available.In multilateration test, the unnotified links are tested. For each neighbour X that did not notify about a link reported by another node Y, with X, Y € WS range. Once all couples of nodes have been checked, each node X for which two or more unnotified links exist is considered as suspect. 2.4 Dynamically updating neighbour position The neighbour discovery protocol is based on nodes sending notification messages tagged with ID and their current region whenever they enter or leave a region. In particular, there are three types of messages:  Leave  Join  Join_reply. Table 1 Summary of notations Notation Description F+ rcv Upper bound on a specific message being delivered F+ ack Upper bound on an acknowledgment being received k Maximum size of the queue t Initial time When a node is about to move into a new region, it broadcasts a leave message some time before leaving. This message indicates to its neighbouring nodes that they should begin tearing down the corresponding link if appropriate. Figure 3: Leave message exchange When a node enters a new region and determines that it is going to remain there for sufficiently long, it broadcasts a join message. This message indicates to the neighbours that they should start position verification for the corresponding link. It also serves as a request to learn the ids of neighbours.
  • 4. Dynamic Neighbor Positioning... www.ijceronline.com ||April||2013|| Page 265 Figure 4: Join and join_reply message exchange Nodes that receive a join message send a join_reply message in response so that the original node can learn their ids. The timing of these messages ensures that the proper semantics of the corresponding links are maintained. This means that the overhead for setting up and tearing down links is taken into account, and reliable message delivery is guaranteed. III. SYSTEM MODEL From the figure 5, the overall flow of the system can be understood. The positioning of neighbours is done and the nodes are classified. Later these positions that are claimed are verified. When a new node enters or leave the range they are updated .while updating also the same verification processes are done. Figure 5: System flow IV. ROBUSTNESS ANALYSIS OF THE PROPOSED SYSTEM A single independent adversary cannot perform any successful attack against the NPV scheme. When the shared neighbourhood increases in size, the probability that the adversary is tagged as faulty rapidly grows to 1. Multiple independent adversaries can only harm each other, thus reducing their probability of successfully announcing a fake position. In coordinated attacks, it is the nature of the neighbourhood that determines the performance of the NPV scheme in presence of colluders. However, in realistic environments, our solution is very robust even to attacks launched by large groups of knowledgeable colluders. This system yields small advantage to the adversaries in terms of displacement. Finally, the overhead introduced by the NPV protocol is reasonable, as it does not exceed a few tens of Kbytes even in the most critical conditions. V. CONCLUSION Techniques for finding neighbours effectively in a non priori trusted environment are identified. The proposed techniques will eventually provide security from malicious nodes. The protocol is robust to adversarial attacks. This protocol will also update the position of the nodes in an active environment. The performance of the proposed scheme will be effective one.
  • 5. Dynamic Neighbor Positioning... www.ijceronline.com ||April||2013|| Page 266 REFRENCES [1] J.H. Song, V.Wong,and V.Leung,”Secure Location verification for Vechicular Ad-Hoc Networks,” Proc.IEEE Globecom,Dec.2008 (adversarial environment). [2] M.Poturalski,P.Papadimitratos, and J- P.Hubaux,”Secure Neighbor Discovery in Wireless Networks:Formal Investigation of Possibility,” proc.ACM Symp.Information,Computer and comm Security (ASIACCS), Mar.2008(time based verification). [3] P.Papadimitratos, M.Poturalski, P.Lafourcade, D.Basin,S.Capkum, and J-P,Hubaux, ”Secure Neighborhood Discovery:A Fundamental Element for Mobile Ad-Hod Networks,” IEEE comm.Magazine,vol.46,no.2,pp.132-139,Feb.2008 (neighbor discovery based on distance). [4] R.Shoki, M.Poturalski, G.Ravot, P.Papadimitratos, and J-P.Hubaux,”A Partical Secure Neighbor Verification Protocol for wireless Sensor Networks,”Proc. Second ACM Conf.Wireless Network Security (Wisec), Mar.2009 ( secure neighbor discovery) . [5] S.Capkun and J-P.Hubaux,”Secure Positioning in Wireless Networks,”IEEE J.Selected Areas in Comm.,Vol.24,pp.221- 232,Feb.2009 (triplet node verification). [6] Marco Fiore, Claudio Ettore Casetti, Carla-Fabiana Chiasserini, Panagiotis Papadimitratos. “Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks”. ieee transactions on mobile computing, vol. 12, no. 2, february 2013. [7] Alejandro Cornejo, Nancy Lynch, Saira Viqar, Jennifer L. Welch “Neighbor Discovery in Mobile Ad Hoc Networks Using an Abstract MAC Layer” November 20, 2009.