CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter

by Anuradha T. Thakre, Sandeep Kadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 10
Year of Publication: 2014
Authors: Anuradha T. Thakre, Sandeep Kadam
10.5120/17413-7997

Anuradha T. Thakre, Sandeep Kadam . Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter. International Journal of Computer Applications. 99, 10 ( August 2014), 52-57. DOI=10.5120/17413-7997

@article{ 10.5120/17413-7997,
author = { Anuradha T. Thakre, Sandeep Kadam },
title = { Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 10 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 52-57 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number10/17413-7997/ },
doi = { 10.5120/17413-7997 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:27:53.784929+05:30
%A Anuradha T. Thakre
%A Sandeep Kadam
%T Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 10
%P 52-57
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Mobile Ad Hoc network (MANET), various protocols and known location services that are used keeps growing, it is necessary for MANET mobile nodes to identify their neighbor's position for effective and truthful communication. However, this MANET process is quite negotiable by attacking mobile node and retrieving their information of respective locations in MANET. Hence it is very essential to have proficient method of discovering neighbors to avoid such attacks for high level security. In recent days, various methods are presented for verifying neighbor positions, but those methods absorbs few limitations with respect to performance. In this paper, "Improving Performance of Neighbor discovery In MANET by Using Threshold value and Time out parameter" the protocol offers false positive and false negative rate improvement within the existence of various attacks for improving the performance of an existing method (NPV) parameters such as; threshold value and time out are introduced. This new protocol fundamentally deals with Mobile Ad Hoc network where a persistent infrastructure is unavailable and the location identification is necessarily learnt via. Node to node communication. Such scenario is highly noticeable because it has a loophole for oppositional nodes to abuse the location based services.

References
  1. SudarshanVasudevan, Micah Adler, Dennis Goeckel, Fellow, IEEE, and Don Towsley, Fellow, IEEE, ACM ," Efficient Algorithms for Neighbor Discovery in Wireless Networks".
  2. Zhensheng Zhang and Bo Li, "Neighbor Discovery in Mobile Ad Hoc Self-Configuring Networks with Directional Antennas: Algorithms and Comparisons".
  3. SudarsanVasudevan, Jim Kurose, Don Towsley, "On Neighbor Discovery in Wireless Networks with Directional Antennas", UMass Computer Science Technical Report 04-53 ECC-0313747001.
  4. Marco Fiore, Member, IEEE, Claudio Casetti, Member, IEEE, Carla-FabianaChiasserini, Senior Member, IEEE,PanagiotisPapadimitratos, Member, IEEE , "Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks".
  5. P. P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J. -P. Hubaux, "Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking," IEEE Communications Magazine, vol. 46, no. 2, 2008.
  6. Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in International Conference on Computer Communications (Infocom), 2003.
  7. S. Capkun, L. Buttyan, and J. Hubaux, "SECTOR: secure tracking of node encounters in multi-hop wireless networks," in ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
  8. M. Poturalski, P. Papadimitratos, and J. Hubaux, "Secure neighbor discovery in wireless networks: formal investigation of possibility," in ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008.
  9. J. -H. Song, V. Wong, V. Leung, "Secure Location Verification for Vehicular Ad-Hoc Networks," IEEE Globecom, New Orleans, LO, Dec. 2008.
  10. T. Leinm¨uller, C. Maih¨ofer, E. Schoch, F. Kargl, "Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification," ACM VANET, Los Angeles, CA, Sept. 2006.
  11. In Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols, Irshad Ullah, Shoaib Ur Rehman
  12. , presented hoe the backhole security threat affect on network. So a new scheme is represented which support for both proactive and reactive. So overcome traffic.
  13. In MANET: Vulnerabilities, Challenges, Attacks, Application, Priyanka Goyal, Vinti Parmar, Rahul Rishi
  14. , discuss how efficiently MANET works but after certain limits there are also created some challenges like limited bandwidth, battery power, computational power, and security. A new method is used to discussed vulnerabilities, application, and security aspects in MANET.
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc networks Neighbor position verification mobile Ad Hoc Networks Security False Positive False Negative.