Skip to main content

Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

MANETs has become a broad area in wireless networks, because of its reduced deployment cost, ease of use, and deliverance from wires. MANETs uses a decentralized and infrastructure-less network, thus making the nodes to route its messages / data with the help of intermediate nodes. Routing in MANETs is carried out with the help of broadcasting schemes, among which MPR is found to be the effectual and uncomplicated scheme. The MPR scheme broadcasts its messages only to the selected MPR nodes. The selected MPR node may be any node in the network, and there are no obligatory and adequate conditions that provides assurance about the selected node’s integrity. In this paper, we have proposed a novel approach in the MPR node selection, by adding a security feature prior to the MPR node selection. We have verified the time constraints and efficiency with the help of localization techniques. Future events are also been discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)

    Article  Google Scholar 

  2. Liang, O., Sekercioglu, Y.A., Mani, N.: A survey of multipoint relay based broadcast schemes in wireless ad hoc networks. IEEE Commun. Surv. Tutorials 8(4), 30–46 (2006)

    Article  Google Scholar 

  3. Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking & Computing, pp. 194–205. ACM (2002)

    Google Scholar 

  4. Kuriakose, J., Joshi, S., Raju, R.V., Kilaru, A.: A review on localization in wireless sensor networks. In: Thampi, S.M., Gelbukh, A., Mukhopadhyay, J. (eds.) Advances in Signal Processing and Intelligent Recognition Systems, pp. 599–610. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  5. Misra, P., Enge, P.: Global Positioning System: Signals, Measurements and Performance, 2nd edn. Ganga-Jamuna Press, Lincoln (2006)

    Google Scholar 

  6. Kuriakose, J., Amruth, V., Sandesh, A.G., Abhilash, V., Kumar, G.P., Nithin, K.: A review on mobile sensor localization. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 30–44. Springer, Heidelberg (2014)

    Google Scholar 

  7. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96–97. ACM (2004)

    Google Scholar 

  9. Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)

    Article  Google Scholar 

  10. Viani, F., Lizzi, L., Rocca, P., Benedetti, M., Donelli, M., Massa, A.: Object tracking through rssi measurements in wireless sensor networks. Electron. Lett. 44(10), 653–654 (2008)

    Article  Google Scholar 

  11. Cheung, K.W., So, H.-C., Ma, W.-K., Chan, Y.-T.: Least squares algorithms for time-of-arrival-based mobile location. IEEE Trans. Sig. Process. 52(4), 1121–1130 (2004)

    Article  MathSciNet  Google Scholar 

  12. Gardner, W.A., Chen, C.-K.: Signal-selective time-difference-of-arrival estimation for passive location of man-made signal sources in highly corruptive environments. i. theory and method. IEEE Trans, Sig. Process. 40(5), 1168–1184 (1992)

    Article  MATH  Google Scholar 

  13. Wang, D., Li, P., Hu, P., Xing, K., Wang, Y., Huang, L., Rong, Y.: On the performance of TDD and LDD based clone attack detection in mobile ad hoc networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 532–539. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Kuriakose, J., Sisodia, P.S., Amruth, V., Kumar, A., Sushanth, K.J., et al.: A comparative analysis of mobile localization and its attacks. In: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, p. 3. ACM (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeril Kuriakose .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kuriakose, J., Amruth, V., Vikram Raju, R. (2015). Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics