Determine and Checking Authentication of Adjacent N.R.Anitha

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
Determine and Checking Authentication of Adjacent
Nodes in Mobile Ad hoc Networks
1
2
N.R.Anitha
M.Tech Student
Department of CSE
SISTK, Puttur, INDIA
Abstract- A large number of temporary nodes consisting of
set of rules and destination based services require that mobile
nodes learn the nearest places. A process can be easily improper
usage or interrupt by opposition nodes. In being away of
fixed nodes the discover and verifying of nearest places that
have been hardly inquired in the existing system .In this
thesis by introducing a complete distributed answer that is
strong and secret against adjacent nodes and can be
damaged only by an huge number of neighbor nodes . Results
that a set of rules can occur more than 99 percent of the
threats . under the best possible state the original nodes are
to be searched.
Keywords— Temporary nodes; Destination based services;
Interrupt; Threats; Neighbor nodes;
I
INTRODUCTION
Destination based services has become an important in mobile
systems where a wide range of set of rules require knowledge
of the place of nodes participation. Routing in networks, data
collecting in sensor networks among robotic nodes, location
based services for handheld devices and danger warning or
traffic perfect in vehicular networks are all examples of
services are available in neighbor position information.
Node locations is to be set right is an main issue in
mobile networks and it becomes particular challenges in the
presence of nodes aiming at injuring the system. In these
situation we need solutions that let nodes:
1. Location are to be establish based on false location
information in spite of threats.
2. Neighbor positions are to be verified, and which have false
locations are to be identified.
In this thesis the main aspect, here in after referred as
neighbor position verification (NPV for short). In wireless
adhoc networks where a services accessed by sources is not
present, and the location data are to be obtained through node
-to-node communication such a scenario are used in location
aware services. For example, data collecting process, routing
in geographical areas, attracting traffic networks or discarding
it, similarly position counterfeit access unauthorized
information are to be accessed by services dependent location.
In this thesis is to perform in absence of fixed nodes, a fully
divided, easy analyse of NPV procedure enables that each
node to retrieve the place advertised by its nearest nodes.
Therefore NPV protocol that has the following features:
1. It is designed for ad hoc networks and it does not rely on the
presence of a priority based nodes.
2. Action are to be performed by a node it allows all
comparision procedures separately.
ISSN: 2231-5381
E. Murali M.TECH.
AssistantProfessor
Department of CSE
SISTK,Puttur,INDIA
3. It can be executed by any node with out priority knowledge
of the nearest node are to be respond.
4. It is strong against independent and together nodes.
5. It is easy analyse, as it generates low traffic time.
Additionally our NPV scheme is used in security
architectures, including the vehicular networks [1], [2], which
represent a neighbor position verification environment.
II. RELATED WORK
Ad hoc security protocols carries a number of problems
related to NPV, there are no strong solutions, easy analyse to
NPV that can executed with in short time with out any priority
based nodes.
Some of the NPV-related problems are secure
positioning and secure disclosure and then solution address to
NPV.
A. Securely finding own place:
In wireless environments, Global Navigation Satellite
Systems are mainly achieved through self-localization e.g.,
Global Positioning System, whose security can be provided by
defense mechanism [3]. Alternate infrastructure of terrestrial
are to be used [4], [5], along with distribution with nonhonest
beacons [6]. some of the safely resolve their own place and
reference time.
B. Secure neighbor detection:
It deals with the establishment of nodes with which a
link can be found with in a given distance [7]. Secure neighbor
detection is only a solution toward the step we are after : an
nearest node can be simply secure discover as neighbor with
in range of SND, but it could still its place with in same
range. In different words, SND is a set of the NPV problem
,since a node can be accessed whether another node is a an
closest of actual one but it place are not to be verified. SND is
mostly used to counting the wormhole attacks [8], [9],[10];
some of the solutions to proposed system related to SND
problem [11], SND as set of rules to prove based on secure
solutions can be in [12], [13].
C. Neighbor place verification:
In the ad hoc and sensor networks; existing NPV
schemes often rely on fixed[14], [15] or mobile[16] fixed
nodes, are to assume always available of places are to be
verified declared by third parties. In temporary locations,
http://www.ijettjournal.org
Page 172
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
either neighbor nodes or infrastructure can be faith unrealistic.
Thus a set of rules does not consist of fixed neighbors.
[16]; also, some of the techniques for precise ToF-based RF
ranging have been developed.
In [17], an NPV consist of set of rules are to be purposed that
first nodes distance are to be calculated, and then which nodes
consist pair of nodes are to be encircled act as verifiers of the
position of their pairs, This information does not used in
priority based nodes, but it is designed for sensor networks are
to be constant and it consists of of multiround computation
lengthy involves many nodes that on a same nearest
comparison . Futher, the resilience of the set of rules in [17],
the information are to be hacked is not explained. The
information in [18], suits constant sensor networks too, and it
consists of many nodes information are to be exchange by a
node signal to be emitted whose place has to be identified.
Nodes carry a different identity and can secure information of
other nodes through public key cryptography [23]. We assume
each node X owns a private key, kX, and a public key, KX ,as
well as set of use one-time keys {k0X; KX0}, as proposed in
emerging architectures for authentication and privacy
enhancing communication [2], [21]. Node X can encrypt and
decrypt data with its keys and public keys of other nodes; It
can produce digital signatures (SigX) with its private key. Any
node, a secure communication architectures [2], [22] , can be
binding between X and KX.
Our NPV solution allows any node to calculate the
position of all the of its neighbors through a message one-time
are to be exchange, which makes is used in wireless and
temporary networks. Addition to NPV scheme is strong
against many attackers hack the information. Some of the
differences can be in the work and [19].
In [20], the authors are identify NPV consist of set of rules
that allows to identify the correct position of neighbor nodes
through some calculations only. This performs checks whether
correct position identified by one neighbor movement may be
possible. This approach in [20], a node several data are to be
collected before take a decision to be taken, based on
situations the solution are to be made where the information
consist of place are to be identified with in a short period of
time. Moreover, the protocol by announcing unknown
locations, that follow a realistic pattern mobility. Among all
nodes NPV protocol is:
1. Any node can be executed reactively at any instant with a
short span period of time.
2. Mobility patterns announces by opposite nodes consist of
strong fake information over time.
Our protocol is to provide a lightweight solution, fully
distributed to the NPV problem that does not require any
structure or a fixed priority based nodes and it is strong
against several attacks, including all nodes are together.
Indeed, non-RF communication, e.g., infrared or ultrasound, is
used in mobile networks, where non-line-of-sight conditions
are frequent and distance can be calculated between deviceto- device in terms of tens or hundreds of meters. An version
of early of this work, some of the verification tests are used to
detect adversaries are to be sketched in NPV protocol.
III.
SYSTEM MODEL
A mobile network and define as a node of communication
neighbors of all other nodes that reach directly its
transmissions [7].Each node its own location with some
maximum error €p, and its share a reference of common time
with the nodes of other: both requirements can be used by
communication nodes with GPS receivers. In addition, nodes
perform Time-of-Flight-based RF ranging with a maximum
error equal to €r. This is a reasonable assumption, it
requirements modifications to off-the-shelf radio interfaces
ISSN: 2231-5381
Nodes are correct with the NPV protocol, and adversarial if
they delete from it. As secure essentially external information,
we focus on the more powerful internal ones, i.e., nodes can
possess to participate in the NPV and try to advertising own
locations or misleading information. Internal adversaries
cannot messages of other nodes they do not have keys. Thus
attacks occurred the cryptosystem are not considered, as
correct implementation of cryptographic primitives makes
them infeasible.
We classify adversaries into: knowledgeable, if at
each time instant positions are to be know and temporary
identities of all their neighbors, and unknowledgeable,
otherwise; independent, if they act individual, and colluding, if
they actions are to be coordinated.
IV.
NPV OVERVIEW
The presented a distributed solution for NPV, which
allows any node in wireless ad hoc networks is to verify the
location of its communication neighbor without relying on
priority based nodes. The analysis shows that a set of rules
protocol is very strong to attacks by independent as well as
together nodes, even when they have perfect knowledge of the
neighbor of the verifier. Simulation results confirm that the
solutions is effective in identifying nodes announcing false
positions. Only an overwhelming presence of colluding nodes
in the neighbor of the verifier, or the unlikely presence of
distributed network topologies, can degrade the effectiveness
of our NPV.
Future work will aimed at integrating the set of rules, as well
as useful in presence of applications that location of the
neighbors.
In methodology, a complete distributed cooperative
scheme for NPV, which enables a source node, to discover
and verify the location of its neighbors. For clarity, here it
describes the principles of route discovery and location
verification process.
Figure 1: Neighbor discovery in adversarial environment
http://www.ijettjournal.org
Page 173
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
A source node, S can initiate the protocol at any time
instant, by triggering the 4- step message exchange process
[POLL, REPLY, REVEAL and REPORT], after completion
of message exchange process, source node S has derives
distance range of neighbor nodes to find the shortest path to
reach destination, after discovery of route S runs verification
tests of several places in order to classify each neighbor node
as either VERIFIED, FAULTY, UNVERFIABLE.
Clearly, the verification tests aim at adversaries
announcing fake positions that are already verified and the
correct nodes whose positions are deemed faulty as well as at
minimizes the number of unverifiable nodes. we remark that
our NPV scheme does not target the creation of a consistent
“map” of neighbor node relations through out an network:
rather, it allows the verifier to classify its neighbors.
V.
NPV PROTOCOL
generated MAC address is used here. A public key K’S carries
chosen from a pool of onetime use keys of S’.
b) REPLY message:
A communication neighbor X receiving the POLL message
will broadcast REPLY message with a time interval MAC
address are generated. This also internally saves the
transmission time. It contains some encrypted message with S
public key (K’S). This message is called as commitment of
XCX.
c)
REVEAL message:
The REVEAL message is broadcasted using verifier’s MAC
address. It contains A map MS, as a proof that S is the verifier
of the original POLL and the identity of verifier ,i.e., it
certifies public key and signature.
d) REPORT message:
NPV protocol is used to message exchange between the
verifier and its neighbors communication, followed it
describes at tests run by the verifier. In NPV protocol it
consists of steps mentioned below:
1.Protocol Message Exchange
2.Position Verification
The REPORT carries X’s position, the time of transmission
X’s REPLY, and the list of pairs of times and temporary
identifiers refers to REPLY broadcasts X received. The
identifiers are obtained from the map MS included in the
REVEAL message. Also, X has its own value by including in
the message its digital signature and it certifies public key.
B. Position Verification:
A. Protocol Message Exchange:
In Protocol Message Exchange, follow the steps
mentioned below:
1. POLL message
2. REPLY message
The node location verification is not suitable for
dynamic environment, since wireless nodes are in change in
nature, so each and every schedule the wireless nodes
undergoes location verification test, thus results in delay time
of delivery packet ratio.
VI PERFORMANCE EVALUATION
3. REVEAL message
We evaluate the presentation of our NPV protocol in a
vehicular situation. Results obtained in a ordinary scenario are
available as supplemental material, which can be found on the
Computer
Society
Digital
Library
at
http://
doi.ieeecomputersociety.org/10.1109/TMC. 2011.258.
4. REPORT message
We focus on well-informed adversary whose goal is
to make the verifier believe their fake positions, and we
describe the best attack approach they can adopt in Section A.
Such a strategy, which depends on the area of the adversary
and builds on a combination of the attacks described and will
be assumed while deriving the results in section B.
Figure 2: Message Exchange Process
a) POLL message:
A verifier S initiates this message. This message is
unidentified. The verifier of identity is kept hidden. Software
ISSN: 2231-5381
The results, which therefore imply a worst case study
of the planned NPV, are shown in terms of the chance that the
tests return false positives and false negatives as well as of
the probability that a (correct or adversary) node is tagged
as unverifiable. In addition, we plot the average differentiation
between the true position of a successful adversary and the
fake position it advertises, as well as the overhead introduced
by our NPV scheme. The outcome on attacks aimed at
discredit the position of other nodes are absent, since they are
very close to those we present later in this part.
http://www.ijettjournal.org
Page 174
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
A. Adversaries Attack Strategy:
The opponent choice on the kind of attack to open is driven by
the tradeoff among the probability of success and the freedom
of choice on its fake position. The basic attack allows the
adversary to choose any false position, but it requires a high
percentage of colluders in the neighborhood in order to be
successful. The colluding attackers agree not only on the
position of the verifier (either guessed or multilaterated), but
also pick a non-collinear common neighbor, X, that they share
with S: each colluder then computes the hyperbola with foci S,
X, and passing through its own real position, and announces a
fake location on such a curve. The hyperbola-based attack
imply less freedom of choice but has higher probability of
success and combining a hyperbola-based attack with a
REPLY- disregard attack yields no chance of success. The
collinear attack pins the opponent into a particular angle with
the verifier, and strictly bounds its distance from the verifier
itself. The presence of two or more correct common
neighbors, which can be used to perform the cross-checks in
the Cross-Symmetry Test, is a condition that foils all the
attack strategies introduced so far. There exists however a last
type of attack, which we name collinear attack, However, if
the network topology features a enough quantity of collinear
nodes, this attack has the highest achievement probability.
The best plan that an opponent can adopt depends on
its neighborhood. First, if it collude with other adversary
outnumbering the noncolluding neighbors, a basic attack is
launched. Otherwise, if the ratio between colluding and
noncolluding neighbors is not greater than (but close enough
to) 1, a hyperbola-based attack is attempt. As a third option, if
noncolluding neighbors greatly outnumber the colluding ones,
but some of the former are collinear with the verifier and
among themselves, the adversary launch a collinear attack.
During it, the adversary can have the noncolluding, collinear
neighbors thrown out of the cross-checks in the Cross Symmetry Test. If none of the above conditions are met, the
adversary picks a hyperbola based attack, i.e., the one with the
highest chances of achievement in absence of noncolluding,
Figure 3: Road layout of the 7x 3 km2 vehicular scenario.
collinear neighbors. Also, an opponent always runs a REPLYdisregard on one noncolluding fellow citizen, avoiding a
variance with it. Recall that disregard just one REPLY does
not trigger the Multilateration Test on the opposition.
B. Results:
We engaged
group traces in place of means of
transportation transfer over a real-world road topology. More
precisely, we considered car movements within a 20 km2
portion of the Karlsruhe urban area depicted in Fig. 8,
ISSN: 2231-5381
extracting 3 hours of vehicular mobility that reproduce mild to
heavy traffic density conditions. These artificial traces were
generated using the IDM-LC model of the VanetMobiSim
simulator, which takes into explanation car-to-car connections,
traffic lights, stop signs, and lane changes, and has been
proven to realistically copy vehicular group patter in urban
scenario [24].
In our simulation, we set Tmax =200 ms, Tjitter = 50
ms, ∆= 1 ms and assume that CSMA/CA is used to contact the
wireless medium, hence messages can be lost due to
collisions. Unless otherwise specified, we fix the nearness
range, R, which is equal to the most nominal show range, to
250 m (resulting in an average region size of 73.4 nodes),
while €r = 6:8 m, €p = 10 m, and the acceptance value €m = 5
m(roughly corresponding to the case of two vehicles moving
at 50 km/h in opposite directions).
To evaluate the presentation of our NPV, at every
simulation second we at random select 1 percent of the nodes
as verifiers. Then, for each verifier, we compare the outcome
of the verification tests with the actual nature of the neighbors.
We consider colluding adversary acting in groups, referred to
as clusters. Note that a colluding cluster size equal to 1
corresponds to independent attacks. Also, adversaries are
knowledgeable, i.e., they completely know the self and place
of all colluding and noncolluding neighbors, and always adopt
the best attack strategy as described in Section A. In the
following, unless otherwise particular, opponent amount to 5
percent of the overall nodes and are divided into clusters of
five colluders each.
In the celebrity of the plots, C stands for accurate
node (e.g.,the label “Cfaulty” refers to the probability of false
positives),while M/Bas, M/Hyp, and M/Col stand for
adversaries introduction, respectively, the basic, hyperbolabased and collinear attack (e.g., the label “M/Bas verified”
refers to the probability of false negatives due to basic
attacks). We first examine the NPV protocol performance for
different values of colluding cluster sizes and R = 250 m
(Figs. 4a and 4b).
The false negative/positive probability in Fig. 4a
clearly shows that 1) chance of wrong classification reaches
0.01 only for a very large adversarial cluster size, namely 10,
2) the hyperbola-based and the collinear attacks are the most
threatening and 3) an attack by the colluders is most effective
in passing themselves off as verified when there are at least
three of them. The cluster size also affects the colluders ability
to disrupt the positioning of correct nodes, which exhibit as
high as a 0.4 percent chance to be tagged as faulty.
Equally, as shown in Fig. 4b, the group amount does
not cause more correct nodes to be unverifiable, since the
main reason for correct nodes to be tag as unverifiable is the
lack of noncollinear neighbors that can prove them. The
chance for an adversary to be unverifiable increases with the
cluster size, even though it is significant only in case of
collinear attacks. This is in agreement with the fact that the
outcome of the collinear attack is the avoidance of a
considerable number of cross-checks between the opponent
http://www.ijettjournal.org
Page 175
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
and correct nodes, thus likely leading the adversary to be tag
as unverifiable.
The region size proves to play an significant role, as
evident in Figs. 4c and 4d where we believe a 5-colluder
cluster and vary the transmission range. A small R (hence few
neighbors) affects the NPV means to properly tag a node.
widen the transmission range with a fixed colluding bunch
size extensively favors the verifier, allow it to reach a certain
and exact decision on either correct or opponent nodes: the
larger the R, the higher the number of cross-checks involving
correct nodes in the Cross -Symmetry Test. We note that, for
show ranges larger than 300 m, we obtain false
positive/negative probability that are smaller than 0.001.
Below 150-m ranges (identical to an standard region size of 12
nodes), such chance are still 0.01.
unverifiable tag being slapped onto more correct nodes. A
final observation can be made looking at the false
positive/negative probability as the positioning error varies
(Figs. 5c and 5d). Fascinatingly, for any positioning error
different from 0, the metrics are only slightly affected.
Finally, we further increase the level of feature of our
analysis and study the advantage obtained by adversaries that
perform a successful attack against the NPV protocol. Such an
adversarial gain is expressed in terms of spatial dislocation,
i.e., difference of position between the real and fraudulently
advertised locations of the successful attacker: clearly, a larger
displacement range implies a superior freedom of group,
which, in turn, enables potentially more dangerous actions
against the system. Attacks where the adversaries aim at
disrupting the verification of correct node positions and
verifier and validate their own fake position. The results in
Fig. 6a are broken down based on the type of attack launched
by the successful opponent, and are limited to the impact of
the show range, since the other parameter did not show major
influence on the displacement of successful attackers.
Figure 4: Probability that a neighbor is tagged incorrectly or as
R(c,d).C:correct; M/Bas, M/Hyp, and M/Col: adversaries
combined with the REPLY-disregard attack.
unverifiable,versus the colluder cluster size (a,b), and versus
launching the basic,hyperbola-based and collinear attack, each
Figure 5: Probability that a neighbor is tagged incorrectly or
Position error (c,d). C:correct; M/Bas, M/Hyp, and M/Col:
Collinear attack, each combined with the REPLY-disregard
Beside the impact of the group size and of the
message range, it is important to understand the effect of the
percentage of adversary in the vehicular network. Thus, in Fig.
5a we fix R to 250 m and the cluster size to 5, and we show
the robustness of our NPV to the density of adversaries: the
probability that adversaries are verified increases ever so
slightly with their density. The highest effect is on the
probability of correct nodes being tagged as faulty, which
however reaches its highest value (0.1) only for 30 percent of
adversaries in the network. A further effect of the growing
presence of adversaries, as shown in Fig. 5b, is the
ISSN: 2231-5381
as unverifiable, versus the ratio of adversaries (a,b), and
adversaries launching the basic, hyperbola-based, and
attack.
http://www.ijettjournal.org
Page 176
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
VII. CONCLUSION
Techniques for finding neighbors efficiently in a non priority
based nodes are identified. The proposed techniques will
eventually provided authentication from attacked nodes. A set
of rules is strong to adversarial attacks. This protocol will also
update the location of the nodes in an active environment. The
performance of the proposed scheme will be effective in
identifying nodes announcing false locations. Future work will
aim at integrating the NPV protocol in a set of rules, as well as
at extending it to a information, useful in presence of
implementation that need each node to continuous verify the
location of its neighbors.
Figure 6: Displacement gain of adversaries running a
successful attack against the NPV (a) and traffic load induced
by one instance of the Protocol (b).
REFERENCES
[1]
We can observe that successful collinear attacks yield
small advantage for adversaries, who are forced to announce
positions quite close to their real locations. Moreover, we
recall that these attacks confine adversaries to advertise fake
positions along a accurate axis, thus further limiting their
choice of movement. We can end that collinear attacks,
typically those with the highest chances of success as
previously discussed, are also those resulting in the smallest
gain for the adversary. Equally, basic attacks allow the largest
average displacements, but we showed that they have
extremely low success chance. The hyperbola-based attacks
appear then to be the most dangerous ones, if the displacement
gain is taken into consideration. However, such a gain
becomes important only for large communication ranges, in
presence of which we already observed that the actual success
possibility of the attacks becomes insignificant.
Finally, we comment on the overhead introduced by
our scheme. The NPV protocol generates at most 2n+2
messages for one execution initiate by a verifier with n
communication neighbors. Also, NPV messages are relatively
small in size: with SHA-1 hashing and ECDSA-160
encryption [25], the length of signature is 21 bytes (with
coordinates compression). Assuming that messages contain
headers with 4-byte source and destination identifiers and 1byte message type field, POLL, REPLY, and REVEAL are 26,
71, and 67 bytes in size, respectively. The REPORT length
depends on the quantity of common neighbor data it carries,
amounting to 4 bytes per shared neighbor: information on
more than 360 neighbors can thus fit in a single IP packet.
Fig. 6b describe the traffic induced on the network by
one instance of the NPV protocol. The plot only accounts for
transmission range variations since, once more, the other
parameters do not have an impact on the overhead. We can
observe that security comes at a cost, since the traffic load of
the NPV protocol is higher than that of a basic nonsecure
neighbor position discovery, consisting of only one poll and
associated position replies from neighbors. More accurately,
the NPV protocol overhead is equal to that of the nonsecure
discovery for smaller transmission ranges, while the variation
tends to increase for better ranges. However, the cost of the
NPV protocol is reasonable in complete terms, since one run
requires just a few tens of kbytes to be substitute among
nodes, even in presence of dense networks and large
communication ranges.
ISSN: 2231-5381
[2]
1609.2-2006: IEEE Trial-Use Standard for Wireless
Access in
Vehicular Environments - Security Services for Applications and
Management Messages, IEEE, 2006.
P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M.
Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux, “Secure Vehicular
Communications: Design and Architecture,” IEEE Comm. Magazine,
vol. 46, no. 11, pp. 100-109, Nov. 2008.
[3] P. Papadimitratos and A. Jovanovic,“GNSS-Based Positioning: Attacks
and Countermeasures,” Proc. IEEE Military Comm. Conf. (MILCOM),
Nov. 2008.
[4]
L. Lazos and R. Poovendran, “HiRLoc: High-Resolution Robust
Localization for Wireless Sensor Networks,” IEEE J. Selected Areas in
Comm., vol. 24, no. 2, pp. 233-246, Feb. 2006.
[5] R. Poovendran and L. Lazos, “A Graph Theoretic Framework for
Preventing the Wormhole Attack,” Wireless Networks, vol. 13, pp. 2759, 2007.
[6] S. Zhong, M. Jadliwala, S. Upadhyaya, and C. Qiao, “Towards a Theory
of Robust Localization against Malicious Beacon Nodes,” Proc. IEEE
INFOCOM, Apr. 2008.
[7]
P.Papadimitratos,M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S.
Capkun,
and
J.-P.
Hubaux,
“Secure
Neighborhood
Discovery:AFundamental Element for Mobile Ad Hoc Networks,” IEEE
Comm. Magazine, vol. 46, no. 2, pp. 132-139, Feb. 2008.
[8]
Y.-C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense
against Wormhole Attacks in Wireless Networks,” Proc. IEEE
INFOCOM, Apr. 2003.
[9]
J.Eriksson, S. Krishnamurthy, and M. Faloutsos,“TrueLink: A Practical
Countermeasure to the Wormhole Attack in Wireless Networks,” Proc.
IEEE 14th Int’l Conf. Network Protocols (ICNP), Nov. 2006.
[10] R.Maheshwari, J.Gao, and S. Das,“Detecting
Wormhole Attacks
in Wireless Networks Using Connectivity Information,” Proc. IEEE
INFOCOM, Apr. 2007.
[11] R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos,
and J.-P
Hubaux, “A Practical Secure Neighbor Verification Protocol for
Wireless Sensor Networks,”Proc. Second ACM Conf. Wireless
Network Security (WiSec), Mar. 2009.
[12] M.Poturalski, P.Papadimitratos, and J.-P.Hubaux, “Secure Neighbor
Discovery in Wireless Networks: Wireless Networks,” IEEE J.
Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006.
[13] M. Poturalksi, P. Papadimitratos, and J.-P. Hubaux,
“Towards Provable Secure Neighbor Discovery in Wireless
Networks,” Proc .Workshop Formal Methods. in Security Eng., Oct.
2008.
[14] E. Ekici, S. Vural, J. McNair, and D.Al-Abri, “Secure Probabilistic
Location Verification in
Randomly Deployed Wireless Sensor
Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 2, pp. 195-209, 2008.
[15] J. Chiang,
J. Haas, and
Y. Hu, “Secure and Precise Location
Verification
Using
Distance
Bounding and Simultaneous
Multilateration,” Proc. Second ACM Conf. Wireless Network Security
(WiSec), Mar. 2009.
[16] S. Capkun, K. Rasmussen, M. Cagalj, and M.
Srivastava, “Secure
Location Verification with Hidden and Mobile Base Stations,” IEEE
Trans. Mobile Computing, vol. 7, no. 4, pp. 470-483, Apr. 2008.
http://www.ijettjournal.org
Page 177
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 4 – Aug 2014
[17] S.Capkun and J.-P. Hubaux, “Secure Positioning in Wireless Networks,”
IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb.
2006.
[18] A. Vora and M. Nesterenko, “Secure Location
Verification Using
Radio Broadcast,” IEEE Trans. Dependable and Secure Computing, vol.
3, no. 4, pp. 377-385, Oct.-Dec. 2006.
[19] J. Hwang, T. He, and Y. Kim, “Detecting Phantom
Nodes in Wireless
Sensor Networks,” Proc. IEEE INFOCOM, May 2007.
[20] T. Leinmu¨ ller, C. Maiho¨ fer, E. Schoch, and F. Kargl, “Improved
Security in Geographic Ad Hoc Routing through Autonomous Position
Verification,” Proc. ACM Third Int’l Workshop Vehicular Ad Hoc
Networks (VANET), Sept. 2006.
[21] PRECIOSA: Privacy Enabled Capability in Co-Operative Systems and
Safety Applications, http://www.preciosa-project.org, 2012.
[22] G. Calandriello, P. Papadimitratos, A. Lioy, and J.-P. Hubaux, “On the
Performance of Secure Vehicular Communication Systems,” IEEE
Trans. Dependable and Secure Computing, vol. 8, no. 6, pp. 898- 912,
Nov./Dec. 2011.
[23]IEEE Standard Specifications for Public-Key Cryptography Amendment
1: Additional Techniques, IEEE 1363a 2004, 2004.
[24] J. Ha¨rri, M. Fiore, F. Filali, and C. Bonnet, “Vehicular Mobility
Simulation with VanetMobiSim,” Trans. Soc. Modeling & Simulation,
2009.
[25] IEEE Standard Specifications for Public-Key Cryptography –
Amendment 1: Additional Techniques, IEEE 1363a 2004, 2004.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 178
Download