earticle

논문검색

Neighbor Position Verification with Improved Quality of Service in Mobile Ad-hoc Networks

초록

영어

A MANET is an autonomous collection of mobile nodes that communicate all the other nodes within their radio ranges. Where the nodes that are not in the direct communication range use intermediate node to communicate with each other. In MANET each mobile node has mobility and move according to the specified locations in the network. Therefore the verification of node locations is an important issue in mobile adhoc networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system. In this research work proposed a protocol called Neighbor position verification (NPV), in order to verify the position of its communication neighbors and detect the adversaries in the mobile adhoc network, This protocol is used to exchanges the messages and verifies the position of communicating nodes in the network. The first scheme is deals with the identification of nodes with which a communication link can be established or that are within a given distance. This distance calculation is based on message exchange between the verifier and its communicated neighbors. After the distances are calculated verifier verifies the position of communicating nodes in networks by following three tests that to be done, they are: 1) Direct symmetry test 2) Cross symmetry test 3) The Multilateration Test. This protocol is implemented over the MANET network and simulated using Network Simulator (NS2). This research work carry out QOS based forwarding node selection scheme to reduce the delay and achieve the high throughput. Performance of the proposed system evaluated based on the parameters such as delay and throughput.

목차

Abstract
 1. Introduction
 2. Related Work
 3. Proposed Work
  3.1. Network Architecture
  3.2. Finding the Position of Neighbors
  3.3. Position Verification
 4. Resilience Analysis
  4.1. Faking Own Position: Independent Adversaries
  4.2. Faking Own Position: Colluding Adversaries
 5. Performance Evaluation
  5.1. Results
 6. Conclusion
 References

저자정보

  • R. Upendar Rao Department of Computer Science and Engineering,VFSTR University
  • D.Veeraiah Department of Computer Science and Engineering,VFSTR University
  • Venkata Naresh Mandhala Department of Information Technology, VFSTR University, Vadlamudi-522213, Guntur, India
  • Tai-hoon Kim Department of Convergence Security, Sungshin Women's University, 249-1, Dongseon-dong 3-ga, Seoul, 136-742, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.