Advertisement

Secured Neighbour Discovery Using Trilateration in Mobile Sensor Networks

  • Jeril Kuriakose
  • Ravindar Yadav
  • Devesh Kumar Srivastava
  • V. Amruth
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 10)

Abstract

In a wireless network, the initial step after deployment of a network is identifying the nodes neighbours. Neighbour discovery is the building block of a network applications and protocols and its responsibility is to identify the one hop neighbours or the nodes that are in the direct communicational range. A minor vulnerability in the neighbour discovery can lead to severe disruptions in the functionalities of the network. In this paper we propose a novel technique to identify the adversary nodes that disrupt the networks functionalities. We have modified the trilateration technique to identify the adversary node. Our security mechanism has been carried out along with the localization procedure without causing any additional overhead. Our technique can achieve successful neighbour discovery even in the presence of cheating nodes. We have also identified the probability of detecting malicious nodes for two different scenarios.

References

  1. 1.
    Johnson, David B., and David A. Maltz. “Dynamic source routing in ad hoc wireless networks.” Mobile computing. Springer US, 1996. 153–181.Google Scholar
  2. 2.
    Li, Li Erran, et al. “A cone-based distributed topology-control algorithm for wireless multi-hop networks.” Networking, IEEE/ACM Transactions on 13.1 (2005): 147–159.Google Scholar
  3. 3.
    Bao, Lichun, and J. J. Garcia-Luna-Aceves. “A new approach to channel access scheduling for ad hoc networks.” Proceedings of the 7th annual international conference on Mobile computing and networking. ACM, 2001.Google Scholar
  4. 4.
    Bakht, Mehedi, Matt Trower, and Robin Hilary Kravets. “Searchlight: won’t you be my neighbor?.” Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 2012.Google Scholar
  5. 5.
    Dutta, Prabal, and David Culler. “Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications.” Proceedings of the 6th ACM conference on Embedded network sensor systems. ACM, 2008.Google Scholar
  6. 6.
    Kandhalu, Arvind, Karthik Lakshmanan, and Ragunathan Raj Rajkumar. “U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol.” Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, 2010.Google Scholar
  7. 7.
    Kuriakose, Jeril, et al. “A review on localization in wireless sensor networks.” Advances in signal processing and intelligent recognition systems. Springer International Publishing, 2014. 599–610.Google Scholar
  8. 8.
    Papadimitratos, Panos, et al. “Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.” Communications Magazine, IEEE 46.2 (2008): 132–139.Google Scholar
  9. 9.
    Kuriakose, Jeril, et al. “A review on mobile sensor localization.” Security in Computing and Communications. Springer Berlin Heidelberg, 2014. 30–44.Google Scholar
  10. 10.
    Amruth, V., et al. “Attacks that Downturn the Performance of Wireless Networks.” Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on. IEEE, 2015.Google Scholar
  11. 11.
    Taylor, Michael AP, Jeremy E. Woolley, and Rocco Zito. “Integration of the global positioning system and geographical information systems for traffic congestion studies.” Transportation Research Part C: Emerging Technologies 8.1 (2000): 257–285.Google Scholar
  12. 12.
    Kuriakose, Jeril, V. Amruth, and R. Ihram Raju. “Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks.” Security in Computing and Communications. Springer International Publishing, 2015. 402–411.Google Scholar
  13. 13.
    Jacquet, Philippe, et al. “Priority and collision detection with active signaling-the channel access mechanism of hiperlan.” Wireless Personal Communications 4.1 (1997): 11–25.Google Scholar
  14. 14.
    Kuriakose, Jeril, and Sandeep Joshi. “A Comparative Review of Moveable Sensor Location Identification.” International Journal of Robotics Applications and Technologies (IJRAT) 3.2 (2015): 20–37.Google Scholar
  15. 15.
    Thomas, Federico, and Lluís Ros. “Revisiting trilateration for robot localization.” Robotics, IEEE Transactions on 21.1 (2005): 93–101.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Jeril Kuriakose
    • 1
    • 2
  • Ravindar Yadav
    • 2
  • Devesh Kumar Srivastava
    • 2
  • V. Amruth
    • 3
  1. 1.St. John College of Engineering and TechnologyPalgharIndia
  2. 2.Manipal University JaipurJaipurIndia
  3. 3.Maharaja Institute of TechnologyMysoreIndia

Personalised recommendations