Follow us on Facebook

Header Ads

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks



Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

ABSTRACT:
A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated in the literature. In this paper, we address this open issue by proposing a fully distributed cooperative solution that is robust against independent and colluding adversaries, and can be impaired only by an overwhelming presence of adversaries. Results show that our protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with minimal false positive rates.
EXISTING SYSTEM:
The correctness of node locations is therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In these cases, we need solutions that let nodes 1) correctly establish their location in spite of attacks feeding false location information, and 2) verify the positions of their neighbors, so as to detect adversarial nodes announcing false locations.


DISADVANTAGES OF EXISTING SYSTEM:
Although the literature carries a multitude of ad hoc security protocols addressing a number of problems related to NPV, there are no lightweight, robust solutions to NPV that can operate autonomously in an open, ephemeral environment, without relying on trusted nodes.
PROPOSED SYSTEM:
In this paper, we focus on the latter aspect, hereinafter referred to as neighbor position verification (NPV for short). Specifically, we deal with a mobile ad hoc network, where a pervasive infrastructure is not present, and the location data must be obtained through node-to-node communication. Such a scenario is of particular interest since it leaves the door open for adversarial nodes to misuse or disrupt the location-based services.
ADVANTAGES OF PROPOSED SYSTEM:
NPV protocol that has the following features:
·        It is designed for spontaneous ad hoc environments, and, as such, it does not rely on the presence of a trusted infrastructure or of a priori trustworthy nodes;
·        It leverages cooperation but allows a node to perform all verification procedures autonomously. This approach has no need for lengthy interactions, e.g., to reach a consensus among multiple nodes, making our scheme suitable for both low- and highmobility environments;
·        It is reactive, meaning that it can be executed by any node, at any point in time, without prior knowledge of the neighborhood;
·        It is robust against independent and colluding adversaries;
·        It is lightweight, as it generates low overhead traffic.
SYSTEM ARCHITECTURE:



ALGORITHMS USED:







SYSTEM CONFIGURATION:-

HARDWARE CONFIGURATION:-


ü Processor             -        Pentium –IV

ü Speed                             -        1.1 Ghz
ü RAM                    -        256 MB(min)
ü Hard Disk            -        20 GB
ü Key Board            -        Standard Windows Keyboard
ü Mouse                  -        Two or Three Button Mouse
ü Monitor                -        SVGA

 

SOFTWARE CONFIGURATION:-


ü Operating System                    : Windows XP
ü Programming Language           : JAVA
ü Java Version                           : JDK 1.6 & above.

REFERENCE:
Marco Fiore, Member, IEEE, Claudio Ettore Casetti, Member, IEEE, Carla-Fabiana Chiasserini, Senior Member, IEEE, and Panagiotis Papadimitratos, Member, IEEE, “Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.