A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours

P Ramojeerao, G Raju, K.T.V Subbarao

Abstract


A distributed solution for NPV any node in a mobile ad hoc network to verify the position of its communication neighbours without depending on a priori trustworthy nodes. In absence of a priori trusted nodes the discovery and verification of neighbor positions presents challenges that have been barely investigated in the literature. In this paper we address this open issue by proposing a fully distributed cooperative solution that is healthy against independent and colluding adversaries and can be damaged only by an overwhelming presence of adversaries. We need solutions that allow nodes correctly set up their location in spite of attacks feeding false location information and confirm the positions of their neighbours so as to notice adversarial nodes announcing false locations.


Keywords


Neighbour position verification, mobile ad hoc networks and vehicular networks.

References


The transparency commenced by the NPV protocol is level-headed as it does not go beyond a few tens of Kbytes even in the most decisive conditions. The revision exhibits that the procedure is extremely vigorous to attacks by independent as well as conniving adversaries even when they have perfect acquaintance of the neighbourhood of the verifier. Simulation results authenticate that the result is proficient in recognizing nodes publicity false positions while maintenance the probability of false positives low. Only an appealing subsistence of colluding adversaries in the neighbourhood of the verifier or the dubious presence of fully collinear network topologies can confound the efficiency of our NPV. NPV which sanctions any node in a mobile ad hoc network to confirm the position of its communication neighbours without relying on a former trustworthy nodes. We presented a distributed solution for NPV which allows any node in a mobile ad hoc network to confirm the position of its communication neighbours without relying on a priori trustworthy nodes.


Full Text: PDF[FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.