Discovery and Verification of Neighbor Positions in Mobile
Ad Hoc Networks
ABSTRACT:
A growing number of ad hoc networking protocols and location-aware services
require that mobile nodes learn the position of their neighbors. However, such a
process can be easily abused or disrupted by adversarial nodes. In absence of a
priori trusted nodes, the discovery and verification of neighbor positions presents
challenges that have been scarcely investigated in the literature. In this paper, we
address this open issue by proposing a fully distributed cooperative solution that is
robust against independent and colluding adversaries, and can be impaired only by
an overwhelming presence of adversaries. Results show that our protocol can
thwart more than 99 percent of the attacks under the best possible conditions for
the adversaries, with minimal false positive rates.
EXISTING SYSTEM:
The correctness of node locations is therefore an all important issue in mobile
networks, and it becomes particularly challenging in the presence of adversaries
aiming at harming the system. In these cases, we need solutions that let nodes 1)
correctly establish their location in spite of attacks feeding false location
information, and 2) verify the positions of their neighbors, so as to detect
adversarial nodes announcing false locations.
DISADVANTAGES OF EXISTING SYSTEM:
Although the literature carries a multitude of ad hoc security protocols addressing a
number of problems related to NPV, there are no lightweight, robust solutions to
NPV that can operate autonomously in an open, ephemeral environment, without
relying on trusted nodes.
PROPOSED SYSTEM:
In this paper, we focus on the latter aspect, hereinafter referred to as neighbor
position verification (NPV for short). Specifically, we deal with a mobile ad hoc
network, where a pervasive infrastructure is not present, and the location data must
be obtained through node-to-node communication. Such a scenario is of particular
interest since it leaves the door open for adversarial nodes to misuse or disrupt the
location-based services.
ADVANTAGES OF PROPOSED SYSTEM:
NPV protocol that has the following features:
It is designed for spontaneous ad hoc environments, and, as such, it does not
rely on the presence of a trusted infrastructure or of a priori trustworthy
nodes;
It leverages cooperation but allows a node to perform all verification
procedures autonomously. This approach has no need for lengthy
interactions, e.g., to reach a consensus among multiple nodes, making our
scheme suitable for both low- and highmobility environments;
It is reactive, meaning that it can be executed by any node, at any point in
time, without prior knowledge of the neighborhood;
It is robust against independent and colluding adversaries;
It is lightweight, as it generates low overhead traffic.
SYSTEM ARCHITECTURE:
ALGORITHMS USED:
 Message exchange protocol: verifier.
 Message exchange protocol: any neighbor.
Discovery and verification of neighbor positions in mobile ad hoc networks
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Marco Fiore, Member, IEEE, Claudio Ettore Casetti, Member, IEEE, Carla-
Fabiana Chiasserini, Senior Member, IEEE, and Panagiotis Papadimitratos,
Member, IEEE, “Discovery and Verification of Neighbor Positions in Mobile Ad
Hoc Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.
12, NO. 2, FEBRUARY 2013.

More Related Content

DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
PPT
Wireless sensor networks
DOCX
Eaack—a secure intrusion detection system for manets ns2
DOCX
Eaack—a secure intrusion detection system for manets
DOCX
containing byzantine failures with control zones
PDF
Security Attacks and its Countermeasures in Wireless Sensor Networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Wireless sensor networks
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets
containing byzantine failures with control zones
Security Attacks and its Countermeasures in Wireless Sensor Networks

What's hot (20)

DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
PPTX
Study of security attacks in manet
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
PPTX
Security Issues in MANET
PDF
Wormhole Attack
PPTX
Security issues in manet
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
PDF
Trusted Routing Path Selection in WSNs through TARF
PPT
Security in mobile ad hoc networks
PPTX
Protocol manet
DOCX
Minimum cost blocking problem in multi path wireless routing protocols
PDF
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
PPTX
A survey on complex wormhole attack in wireless
PPTX
Wormhole attack
DOCX
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
PDF
D0961927
PDF
An ids scheme against black hole attack to secure aomdv routing in manet
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PDF
Investigation of detection & prevention sinkhole attack in manet
Eaack—a secure intrusion detection system for mane ts
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Study of security attacks in manet
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Security Issues in MANET
Wormhole Attack
Security issues in manet
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
Trusted Routing Path Selection in WSNs through TARF
Security in mobile ad hoc networks
Protocol manet
Minimum cost blocking problem in multi path wireless routing protocols
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
A survey on complex wormhole attack in wireless
Wormhole attack
IEEE 2014 NS2 NETWORKING PROJECTS Asymptotic analysis on secrecy capacity in...
D0961927
An ids scheme against black hole attack to secure aomdv routing in manet
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Investigation of detection & prevention sinkhole attack in manet
Ad

Viewers also liked (6)

DOCX
Enforcing secure and privacy preserving information brokering in distributed ...
DOCX
Dynamic control of coding for progressive packet arrivals in dtns
DOC
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Privacy preserving data sharing with anonymous id assignment
PDF
An Enhanced P2P Architecture for Dispersed Service Discovery
PDF
Secure Trust Management Model for Peer-to-Peer File Sharing System
Enforcing secure and privacy preserving information brokering in distributed ...
Dynamic control of coding for progressive packet arrivals in dtns
Scalable and secure sharing of personal health records in cloud computing usi...
Privacy preserving data sharing with anonymous id assignment
An Enhanced P2P Architecture for Dispersed Service Discovery
Secure Trust Management Model for Peer-to-Peer File Sharing System
Ad

Similar to Discovery and verification of neighbor positions in mobile ad hoc networks (20)

PDF
B43040610
PDF
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Java discovery and verification of neighbor positions in mobile ad hoc networks
PDF
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
PPTX
Behavioral malware detection in delay tolerant network
PDF
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
PPT
Paper1
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PDF
International Journal of Computational Engineering Research(IJCER)
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
C0511318
PDF
International Journal of Engineering Research and Development
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
DOCX
Secure final
PDF
I1802046780
B43040610
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Java discovery and verification of neighbor positions in mobile ad hoc networks
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
Behavioral malware detection in delay tolerant network
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Paper1
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
International Journal of Computational Engineering Research(IJCER)
A wireless intrusion detection system and a new attack model (synopsis)
C0511318
International Journal of Engineering Research and Development
Detection and localization of multiple spoofing attackers in wireless networks
Secure final
I1802046780

Recently uploaded (20)

PPTX
BASIC SPORTS NUTRITION, presentation from a doctor to UCSSC
DOCX
Cristiano Ronaldo Set to Make History at the World Cup in the USA.docx
PDF
FIFA World Cup Man Utd Duo Return for Brazil’s FIFA 2026 Qualifiers.pdf
PDF
CH-5 (1).pdfjsjdjjdjdjdjdjdjdjdjdjdjdjdndjdn
DOCX
Pulisic Back in US Squad for S Korea, Japan Friendlies.docx
DOCX
FIFA World Cup Vegas Chosen to Host Group Draw for Historic World Cup.docx
PDF
Tuihiuft7hf7uhu97ef boss FF see ee so do to to
PDF
Rugby: From Tradition to Modern Glory aviator-online.net.in
PPTX
PHYSICAL EDUCATION AND HEALTH LESSON.pptx
DOCX
FIFA World Cup Final Houston Prepares to Host an Unforgettable World Cup Expe...
PDF
FIFA_Ethical Recruitment Guide_Appendix02.pdf
PDF
FIFA 2026 Mexico expects to earn $3 billion from hosting the FIFA World Cup.pdf
PDF
The Super Bowl: America's Biggest Sporting Event
DOCX
Sell World Cup Trump’s Meeting with FIFA Chief Overshadowed by No-Tie Gesture...
DOCX
World Cup Trump, Infantino Announce FIFA 2026 Group Draw.docx
DOCX
FIFA World Cup 2026 Tickets: Brazil Squad Announced for World Cup Qualifiers
PDF
Argentina star reportedly snubs Tottenham.pdf
PDF
Uehehhehdhehehdjdjdjdjdjdjdjdjjdjdjdjdhdhdbdbdndndb
PPTX
SWIM COACHING CERTIFICATION LEVEL 1 - PART 2
DOCX
NFL London: Jets Preseason Wrap-Up roster
BASIC SPORTS NUTRITION, presentation from a doctor to UCSSC
Cristiano Ronaldo Set to Make History at the World Cup in the USA.docx
FIFA World Cup Man Utd Duo Return for Brazil’s FIFA 2026 Qualifiers.pdf
CH-5 (1).pdfjsjdjjdjdjdjdjdjdjdjdjdjdjdndjdn
Pulisic Back in US Squad for S Korea, Japan Friendlies.docx
FIFA World Cup Vegas Chosen to Host Group Draw for Historic World Cup.docx
Tuihiuft7hf7uhu97ef boss FF see ee so do to to
Rugby: From Tradition to Modern Glory aviator-online.net.in
PHYSICAL EDUCATION AND HEALTH LESSON.pptx
FIFA World Cup Final Houston Prepares to Host an Unforgettable World Cup Expe...
FIFA_Ethical Recruitment Guide_Appendix02.pdf
FIFA 2026 Mexico expects to earn $3 billion from hosting the FIFA World Cup.pdf
The Super Bowl: America's Biggest Sporting Event
Sell World Cup Trump’s Meeting with FIFA Chief Overshadowed by No-Tie Gesture...
World Cup Trump, Infantino Announce FIFA 2026 Group Draw.docx
FIFA World Cup 2026 Tickets: Brazil Squad Announced for World Cup Qualifiers
Argentina star reportedly snubs Tottenham.pdf
Uehehhehdhehehdjdjdjdjdjdjdjdjjdjdjdjdhdhdbdbdndndb
SWIM COACHING CERTIFICATION LEVEL 1 - PART 2
NFL London: Jets Preseason Wrap-Up roster

Discovery and verification of neighbor positions in mobile ad hoc networks

  • 1. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks ABSTRACT: A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated in the literature. In this paper, we address this open issue by proposing a fully distributed cooperative solution that is robust against independent and colluding adversaries, and can be impaired only by an overwhelming presence of adversaries. Results show that our protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with minimal false positive rates. EXISTING SYSTEM: The correctness of node locations is therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In these cases, we need solutions that let nodes 1) correctly establish their location in spite of attacks feeding false location
  • 2. information, and 2) verify the positions of their neighbors, so as to detect adversarial nodes announcing false locations. DISADVANTAGES OF EXISTING SYSTEM: Although the literature carries a multitude of ad hoc security protocols addressing a number of problems related to NPV, there are no lightweight, robust solutions to NPV that can operate autonomously in an open, ephemeral environment, without relying on trusted nodes. PROPOSED SYSTEM: In this paper, we focus on the latter aspect, hereinafter referred to as neighbor position verification (NPV for short). Specifically, we deal with a mobile ad hoc network, where a pervasive infrastructure is not present, and the location data must be obtained through node-to-node communication. Such a scenario is of particular interest since it leaves the door open for adversarial nodes to misuse or disrupt the location-based services. ADVANTAGES OF PROPOSED SYSTEM: NPV protocol that has the following features: It is designed for spontaneous ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes;
  • 3. It leverages cooperation but allows a node to perform all verification procedures autonomously. This approach has no need for lengthy interactions, e.g., to reach a consensus among multiple nodes, making our scheme suitable for both low- and highmobility environments; It is reactive, meaning that it can be executed by any node, at any point in time, without prior knowledge of the neighborhood; It is robust against independent and colluding adversaries; It is lightweight, as it generates low overhead traffic. SYSTEM ARCHITECTURE: ALGORITHMS USED:  Message exchange protocol: verifier.  Message exchange protocol: any neighbor.
  • 5. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB
  • 6.  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Marco Fiore, Member, IEEE, Claudio Ettore Casetti, Member, IEEE, Carla- Fabiana Chiasserini, Senior Member, IEEE, and Panagiotis Papadimitratos, Member, IEEE, “Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.