Abstract
In a wireless network, the initial step after deployment of a network is identifying the nodes neighbours. Neighbour discovery is the building block of a network applications and protocols and its responsibility is to identify the one hop neighbours or the nodes that are in the direct communicational range. A minor vulnerability in the neighbour discovery can lead to severe disruptions in the functionalities of the network. In this paper we propose a novel technique to identify the adversary nodes that disrupt the networks functionalities. We have modified the trilateration technique to identify the adversary node. Our security mechanism has been carried out along with the localization procedure without causing any additional overhead. Our technique can achieve successful neighbour discovery even in the presence of cheating nodes. We have also identified the probability of detecting malicious nodes for two different scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johnson, David B., and David A. Maltz. “Dynamic source routing in ad hoc wireless networks.” Mobile computing. Springer US, 1996. 153–181.
Li, Li Erran, et al. “A cone-based distributed topology-control algorithm for wireless multi-hop networks.” Networking, IEEE/ACM Transactions on 13.1 (2005): 147–159.
Bao, Lichun, and J. J. Garcia-Luna-Aceves. “A new approach to channel access scheduling for ad hoc networks.” Proceedings of the 7th annual international conference on Mobile computing and networking. ACM, 2001.
Bakht, Mehedi, Matt Trower, and Robin Hilary Kravets. “Searchlight: won’t you be my neighbor?.” Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 2012.
Dutta, Prabal, and David Culler. “Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications.” Proceedings of the 6th ACM conference on Embedded network sensor systems. ACM, 2008.
Kandhalu, Arvind, Karthik Lakshmanan, and Ragunathan Raj Rajkumar. “U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol.” Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, 2010.
Kuriakose, Jeril, et al. “A review on localization in wireless sensor networks.” Advances in signal processing and intelligent recognition systems. Springer International Publishing, 2014. 599–610.
Papadimitratos, Panos, et al. “Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.” Communications Magazine, IEEE 46.2 (2008): 132–139.
Kuriakose, Jeril, et al. “A review on mobile sensor localization.” Security in Computing and Communications. Springer Berlin Heidelberg, 2014. 30–44.
Amruth, V., et al. “Attacks that Downturn the Performance of Wireless Networks.” Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on. IEEE, 2015.
Taylor, Michael AP, Jeremy E. Woolley, and Rocco Zito. “Integration of the global positioning system and geographical information systems for traffic congestion studies.” Transportation Research Part C: Emerging Technologies 8.1 (2000): 257–285.
Kuriakose, Jeril, V. Amruth, and R. Ihram Raju. “Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks.” Security in Computing and Communications. Springer International Publishing, 2015. 402–411.
Jacquet, Philippe, et al. “Priority and collision detection with active signaling-the channel access mechanism of hiperlan.” Wireless Personal Communications 4.1 (1997): 11–25.
Kuriakose, Jeril, and Sandeep Joshi. “A Comparative Review of Moveable Sensor Location Identification.” International Journal of Robotics Applications and Technologies (IJRAT) 3.2 (2015): 20–37.
Thomas, Federico, and Lluís Ros. “Revisiting trilateration for robot localization.” Robotics, IEEE Transactions on 21.1 (2005): 93–101.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kuriakose, J., Yadav, R., Srivastava, D.K., Amruth, V. (2018). Secured Neighbour Discovery Using Trilateration in Mobile Sensor Networks. In: Mishra, D., Nayak, M., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Lecture Notes in Networks and Systems, vol 10. Springer, Singapore. https://doi.org/10.1007/978-981-10-3920-1_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-3920-1_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3919-5
Online ISBN: 978-981-10-3920-1
eBook Packages: EngineeringEngineering (R0)