Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
ABSTRACT:
A growing number of ad hoc networking protocols and location-aware services require that
mobile nodes learn the position of their neighbors. However, such a process can be easily
abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and
verification of neighbor positions presents challenges that have been scarcely investigated in the
literature. In this paper, we address this open issue by proposing a fully distributed cooperative
solution that is robust against independent and colluding adversaries, and can be impaired only
by an overwhelming presence of adversaries. Results show that our protocol can thwart more
than 99 percent of the attacks under the best possible conditions for the adversaries, with
minimal false positive rates.
EXISTING SYSTEM:
Geographic routing in spontaneous networks, data gathering in sensor networks, movement
coordination among autonomous robotic nodes, location-specific services for handheld devices,
and danger warning or traffic monitoring in vehicular networks are all examples of services that
build on the availability of neighbor position information. The correctness of node locations is
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
therefore an all important issue in mobile networks, and it becomes particularly challenging in
the presence of adversaries aiming at harming the system
DISADVANTAGES OF EXISTING SYSTEM:
 Correctly establish their location in spite of attacks feeding false location information,
and
 Verify the positions of their neighbors, so as to detect adversarial nodes announcing false
locations.
PROPOSED SYSTEM:
In this paper, we focus on the latter aspect, hereinafter referred to as neighbor position
verification (NPV for short). Specifically, we deal with a mobile ad hoc network, where a
pervasive infrastructure is not present, and the location data must be obtained through node-to-
node communication. Such a scenario is of particular interest since it leaves the door open for
adversarial nodes to misuse or disrupt the location-based services. For example, by advertising
forged positions, adversaries could bias geographic routing or data gathering processes,
attracting network traffic and then eavesdropping or discarding it. Similarly, counterfeit
positions could grant adversaries unauthorized access to location-dependent services, let
vehicles forfeit road tolls, disrupt vehicular traffic or endanger passengers and drivers.
ADVANTAGES OF PROPOSED SYSTEM:
 Our NPV scheme is compatible with state-of the-art security architectures, including the
ones that have been proposed for vehicular networks.
 It is lightweight, as it generates low overhead traffic.
 It is robust against independent and colluding adversaries
 It leverages cooperation but allows a node to perform all verification procedures
autonomously
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 512 MB(min)
 Hard Disk - 40 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - LCD/LED
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command Language)
REFERENCE:
Marco Fiore,Member, IEEE, Claudio Ettore Casetti, Member, IEEE, Carla-Fabiana
Chiasserini,Senior Member, IEEE, and Panagiotis Papadimitratos, Member, IEEE “Discovery
and Verification of Neighbor Positions in Mobile Ad Hoc Networks” - IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.

More Related Content

DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
PPTX
VANET Research Project Help
PPTX
Underwater Sensor Network Project Topics
PDF
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
PDF
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
PDF
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Detection of-sybil-attack-using-position-verification-method-in-manets
Discovery and verification of neighbor positions in mobile ad hoc networks
VANET Research Project Help
Underwater Sensor Network Project Topics
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
Eaack—a secure intrusion detection system for mane ts
Detection of-sybil-attack-using-position-verification-method-in-manets

What's hot (9)

PDF
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
PPTX
Various Metaheuristic algorithms For Securing VANET
PDF
Ijmer 46069196
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
PDF
A Study on Evaluation of DoS Attacks in WiMAX Networks
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PPTX
Manet ppt
PDF
A Review of Network Layer Attacks and Countermeasures in WSN
PDF
M.E/M.Tech IEEE Projects in Network Simulator-2
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Various Metaheuristic algorithms For Securing VANET
Ijmer 46069196
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Study on Evaluation of DoS Attacks in WiMAX Networks
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
Manet ppt
A Review of Network Layer Attacks and Countermeasures in WSN
M.E/M.Tech IEEE Projects in Network Simulator-2
Ad

Viewers also liked (7)

DOCX
On quality of monitoring for multi channel wireless infrastructure networks
DOCX
Error tolerant resource allocation and payment minimization for cloud system
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
On the real time hardware implementation feasibility of joint radio resource ...
DOCX
Dcim distributed cache invalidation method for maintaining cache consistency ...
DOCX
Distributed processing of probabilistic top k queries in wireless sensor netw...
DOCX
Automatic semantic content extraction in videos using a fuzzy ontology and ru...
On quality of monitoring for multi channel wireless infrastructure networks
Error tolerant resource allocation and payment minimization for cloud system
Participatory privacy enabling privacy in participatory sensing
On the real time hardware implementation feasibility of joint radio resource ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
Distributed processing of probabilistic top k queries in wireless sensor netw...
Automatic semantic content extraction in videos using a fuzzy ontology and ru...
Ad

Similar to Discovery and verification of neighbor positions in mobile ad hoc networks (20)

DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Android discovery and verification of neighbor positions in mobile ad hoc ne...
PDF
Java discovery and verification of neighbor positions in mobile ad hoc networks
PDF
Discovery and verification of neighbor positions in mobile ad hoc networks
PDF
B43040610
DOCX
Discovery and verification Documentation
PDF
Different Prediction Methods For Route Recovery In MANET
PDF
Link Reliability based Detection and Predecessor base Route Establishment for...
PDF
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
PDF
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
PDF
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
PPTX
Classification and review of security schemes
PDF
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
PDF
Wormhole Attack
PDF
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
PDF
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
PDF
Dt36717722
PDF
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
PDF
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLES
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Java discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
B43040610
Discovery and verification Documentation
Different Prediction Methods For Route Recovery In MANET
Link Reliability based Detection and Predecessor base Route Establishment for...
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Classification and review of security schemes
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Wormhole Attack
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
Dt36717722
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
EXAMINING MODERN DATA SECURITY AND PRIVACY PROTOCOLS IN AUTONOMOUS VEHICLES

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
DOCX
Reversible data hiding with optimal value transfer
DOCX
Query adaptive image search with hash codes
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Local directional number pattern for face analysis face and expression recogn...
DOCX
An access point based fec mechanism for video transmission over wireless la ns
DOCX
Towards differential query services in cost efficient clouds
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
DOCX
Non cooperative location privacy
DOCX
Harnessing the cloud for securely outsourcing large
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
DOCX
Two tales of privacy in online social networks
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
Reversible watermarking based on invariant image classification and dynamic h...
Reversible data hiding with optimal value transfer
Query adaptive image search with hash codes
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Local directional number pattern for face analysis face and expression recogn...
An access point based fec mechanism for video transmission over wireless la ns
Towards differential query services in cost efficient clouds
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Secure and efficient data transmission for cluster based wireless sensor netw...
Privacy preserving back propagation neural network learning over arbitrarily ...
Non cooperative location privacy
Harnessing the cloud for securely outsourcing large
Geo community-based broadcasting for data dissemination in mobile social netw...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Dynamic resource allocation using virtual machines for cloud computing enviro...
A secure protocol for spontaneous wireless ad hoc networks creation
Utility privacy tradeoff in databases an information-theoretic approach
Two tales of privacy in online social networks

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Geologic Time for studying geology for geologist
PDF
STKI Israel Market Study 2025 version august
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Architecture types and enterprise applications.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Geologic Time for studying geology for geologist
STKI Israel Market Study 2025 version august
Build Your First AI Agent with UiPath.pptx
Getting started with AI Agents and Multi-Agent Systems
Architecture types and enterprise applications.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Module 1.ppt Iot fundamentals and Architecture
Taming the Chaos: How to Turn Unstructured Data into Decisions
Benefits of Physical activity for teenagers.pptx
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
TEXTILE technology diploma scope and career opportunities
1 - Historical Antecedents, Social Consideration.pdf
A proposed approach for plagiarism detection in Myanmar Unicode text
Developing a website for English-speaking practice to English as a foreign la...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Convolutional neural network based encoder-decoder for efficient real-time ob...
The influence of sentiment analysis in enhancing early warning system model f...

Discovery and verification of neighbor positions in mobile ad hoc networks

  • 1. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks ABSTRACT: A growing number of ad hoc networking protocols and location-aware services require that mobile nodes learn the position of their neighbors. However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated in the literature. In this paper, we address this open issue by proposing a fully distributed cooperative solution that is robust against independent and colluding adversaries, and can be impaired only by an overwhelming presence of adversaries. Results show that our protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with minimal false positive rates. EXISTING SYSTEM: Geographic routing in spontaneous networks, data gathering in sensor networks, movement coordination among autonomous robotic nodes, location-specific services for handheld devices, and danger warning or traffic monitoring in vehicular networks are all examples of services that build on the availability of neighbor position information. The correctness of node locations is GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. therefore an all important issue in mobile networks, and it becomes particularly challenging in the presence of adversaries aiming at harming the system DISADVANTAGES OF EXISTING SYSTEM:  Correctly establish their location in spite of attacks feeding false location information, and  Verify the positions of their neighbors, so as to detect adversarial nodes announcing false locations. PROPOSED SYSTEM: In this paper, we focus on the latter aspect, hereinafter referred to as neighbor position verification (NPV for short). Specifically, we deal with a mobile ad hoc network, where a pervasive infrastructure is not present, and the location data must be obtained through node-to- node communication. Such a scenario is of particular interest since it leaves the door open for adversarial nodes to misuse or disrupt the location-based services. For example, by advertising forged positions, adversaries could bias geographic routing or data gathering processes, attracting network traffic and then eavesdropping or discarding it. Similarly, counterfeit positions could grant adversaries unauthorized access to location-dependent services, let vehicles forfeit road tolls, disrupt vehicular traffic or endanger passengers and drivers. ADVANTAGES OF PROPOSED SYSTEM:  Our NPV scheme is compatible with state-of the-art security architectures, including the ones that have been proposed for vehicular networks.  It is lightweight, as it generates low overhead traffic.  It is robust against independent and colluding adversaries  It leverages cooperation but allows a node to perform all verification procedures autonomously
  • 3. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2  Front End : OTCL (Object Oriented Tool Command Language) REFERENCE: Marco Fiore,Member, IEEE, Claudio Ettore Casetti, Member, IEEE, Carla-Fabiana Chiasserini,Senior Member, IEEE, and Panagiotis Papadimitratos, Member, IEEE “Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks” - IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2, FEBRUARY 2013.