Abstract
MANETs has become a broad area in wireless networks, because of its reduced deployment cost, ease of use, and deliverance from wires. MANETs uses a decentralized and infrastructure-less network, thus making the nodes to route its messages / data with the help of intermediate nodes. Routing in MANETs is carried out with the help of broadcasting schemes, among which MPR is found to be the effectual and uncomplicated scheme. The MPR scheme broadcasts its messages only to the selected MPR nodes. The selected MPR node may be any node in the network, and there are no obligatory and adequate conditions that provides assurance about the selected node’s integrity. In this paper, we have proposed a novel approach in the MPR node selection, by adding a security feature prior to the MPR node selection. We have verified the time constraints and efficiency with the help of localization techniques. Future events are also been discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liu, K., Deng, J., Varshney, P.K., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Trans. Mob. Comput. 6(5), 536–550 (2007)
Liang, O., Sekercioglu, Y.A., Mani, N.: A survey of multipoint relay based broadcast schemes in wireless ad hoc networks. IEEE Commun. Surv. Tutorials 8(4), 30–46 (2006)
Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking & Computing, pp. 194–205. ACM (2002)
Kuriakose, J., Joshi, S., Raju, R.V., Kilaru, A.: A review on localization in wireless sensor networks. In: Thampi, S.M., Gelbukh, A., Mukhopadhyay, J. (eds.) Advances in Signal Processing and Intelligent Recognition Systems, pp. 599–610. Springer, Heidelberg (2014)
Misra, P., Enge, P.: Global Positioning System: Signals, Measurements and Performance, 2nd edn. Ganga-Jamuna Press, Lincoln (2006)
Kuriakose, J., Amruth, V., Sandesh, A.G., Abhilash, V., Kumar, G.P., Nithin, K.: A review on mobile sensor localization. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 30–44. Springer, Heidelberg (2014)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96–97. ACM (2004)
Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)
Viani, F., Lizzi, L., Rocca, P., Benedetti, M., Donelli, M., Massa, A.: Object tracking through rssi measurements in wireless sensor networks. Electron. Lett. 44(10), 653–654 (2008)
Cheung, K.W., So, H.-C., Ma, W.-K., Chan, Y.-T.: Least squares algorithms for time-of-arrival-based mobile location. IEEE Trans. Sig. Process. 52(4), 1121–1130 (2004)
Gardner, W.A., Chen, C.-K.: Signal-selective time-difference-of-arrival estimation for passive location of man-made signal sources in highly corruptive environments. i. theory and method. IEEE Trans, Sig. Process. 40(5), 1168–1184 (1992)
Wang, D., Li, P., Hu, P., Xing, K., Wang, Y., Huang, L., Rong, Y.: On the performance of TDD and LDD based clone attack detection in mobile ad hoc networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 532–539. Springer, Heidelberg (2012)
Kuriakose, J., Sisodia, P.S., Amruth, V., Kumar, A., Sushanth, K.J., et al.: A comparative analysis of mobile localization and its attacks. In: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, p. 3. ACM (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kuriakose, J., Amruth, V., Vikram Raju, R. (2015). Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)