Skip to main content

Secured Neighbour Discovery Using Trilateration in Mobile Sensor Networks

  • Conference paper
  • First Online:
Information and Communication Technology for Sustainable Development

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 10))

  • 844 Accesses

Abstract

In a wireless network, the initial step after deployment of a network is identifying the nodes neighbours. Neighbour discovery is the building block of a network applications and protocols and its responsibility is to identify the one hop neighbours or the nodes that are in the direct communicational range. A minor vulnerability in the neighbour discovery can lead to severe disruptions in the functionalities of the network. In this paper we propose a novel technique to identify the adversary nodes that disrupt the networks functionalities. We have modified the trilateration technique to identify the adversary node. Our security mechanism has been carried out along with the localization procedure without causing any additional overhead. Our technique can achieve successful neighbour discovery even in the presence of cheating nodes. We have also identified the probability of detecting malicious nodes for two different scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johnson, David B., and David A. Maltz. “Dynamic source routing in ad hoc wireless networks.” Mobile computing. Springer US, 1996. 153–181.

    Google Scholar 

  2. Li, Li Erran, et al. “A cone-based distributed topology-control algorithm for wireless multi-hop networks.” Networking, IEEE/ACM Transactions on 13.1 (2005): 147–159.

    Google Scholar 

  3. Bao, Lichun, and J. J. Garcia-Luna-Aceves. “A new approach to channel access scheduling for ad hoc networks.” Proceedings of the 7th annual international conference on Mobile computing and networking. ACM, 2001.

    Google Scholar 

  4. Bakht, Mehedi, Matt Trower, and Robin Hilary Kravets. “Searchlight: won’t you be my neighbor?.” Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 2012.

    Google Scholar 

  5. Dutta, Prabal, and David Culler. “Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications.” Proceedings of the 6th ACM conference on Embedded network sensor systems. ACM, 2008.

    Google Scholar 

  6. Kandhalu, Arvind, Karthik Lakshmanan, and Ragunathan Raj Rajkumar. “U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol.” Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, 2010.

    Google Scholar 

  7. Kuriakose, Jeril, et al. “A review on localization in wireless sensor networks.” Advances in signal processing and intelligent recognition systems. Springer International Publishing, 2014. 599–610.

    Google Scholar 

  8. Papadimitratos, Panos, et al. “Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.” Communications Magazine, IEEE 46.2 (2008): 132–139.

    Google Scholar 

  9. Kuriakose, Jeril, et al. “A review on mobile sensor localization.” Security in Computing and Communications. Springer Berlin Heidelberg, 2014. 30–44.

    Google Scholar 

  10. Amruth, V., et al. “Attacks that Downturn the Performance of Wireless Networks.” Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on. IEEE, 2015.

    Google Scholar 

  11. Taylor, Michael AP, Jeremy E. Woolley, and Rocco Zito. “Integration of the global positioning system and geographical information systems for traffic congestion studies.” Transportation Research Part C: Emerging Technologies 8.1 (2000): 257–285.

    Google Scholar 

  12. Kuriakose, Jeril, V. Amruth, and R. Ihram Raju. “Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks.” Security in Computing and Communications. Springer International Publishing, 2015. 402–411.

    Google Scholar 

  13. Jacquet, Philippe, et al. “Priority and collision detection with active signaling-the channel access mechanism of hiperlan.” Wireless Personal Communications 4.1 (1997): 11–25.

    Google Scholar 

  14. Kuriakose, Jeril, and Sandeep Joshi. “A Comparative Review of Moveable Sensor Location Identification.” International Journal of Robotics Applications and Technologies (IJRAT) 3.2 (2015): 20–37.

    Google Scholar 

  15. Thomas, Federico, and Lluís Ros. “Revisiting trilateration for robot localization.” Robotics, IEEE Transactions on 21.1 (2005): 93–101.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeril Kuriakose .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kuriakose, J., Yadav, R., Srivastava, D.K., Amruth, V. (2018). Secured Neighbour Discovery Using Trilateration in Mobile Sensor Networks. In: Mishra, D., Nayak, M., Joshi, A. (eds) Information and Communication Technology for Sustainable Development. Lecture Notes in Networks and Systems, vol 10. Springer, Singapore. https://doi.org/10.1007/978-981-10-3920-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3920-1_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3919-5

  • Online ISBN: 978-981-10-3920-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics