Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 10
Year of Publication: 2014
Anuradha T. Thakre
Sandeep Kadam

Anuradha T Thakre and Sandeep Kadam. Article: Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter. International Journal of Computer Applications 99(10):52-57, August 2014. Full text available. BibTeX

	author = {Anuradha T. Thakre and Sandeep Kadam},
	title = {Article: Improving Performance of Neighbor Discovery in MANET by using Threshold Value and Time Out Parameter},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {10},
	pages = {52-57},
	month = {August},
	note = {Full text available}


In Mobile Ad Hoc network (MANET), various protocols and known location services that are used keeps growing, it is necessary for MANET mobile nodes to identify their neighbor's position for effective and truthful communication. However, this MANET process is quite negotiable by attacking mobile node and retrieving their information of respective locations in MANET. Hence it is very essential to have proficient method of discovering neighbors to avoid such attacks for high level security. In recent days, various methods are presented for verifying neighbor positions, but those methods absorbs few limitations with respect to performance. In this paper, "Improving Performance of Neighbor discovery In MANET by Using Threshold value and Time out parameter" the protocol offers false positive and false negative rate improvement within the existence of various attacks for improving the performance of an existing method (NPV) parameters such as; threshold value and time out are introduced. This new protocol fundamentally deals with Mobile Ad Hoc network where a persistent infrastructure is unavailable and the location identification is necessarily learnt via. Node to node communication. Such scenario is highly noticeable because it has a loophole for oppositional nodes to abuse the location based services.


  • SudarshanVasudevan, Micah Adler, Dennis Goeckel, Fellow, IEEE, and Don Towsley, Fellow, IEEE, ACM ," Efficient Algorithms for Neighbor Discovery in Wireless Networks".
  • Zhensheng Zhang and Bo Li, "Neighbor Discovery in Mobile Ad Hoc Self-Configuring Networks with Directional Antennas: Algorithms and Comparisons".
  • SudarsanVasudevan, Jim Kurose, Don Towsley, "On Neighbor Discovery in Wireless Networks with Directional Antennas", UMass Computer Science Technical Report 04-53 ECC-0313747001.
  • Marco Fiore, Member, IEEE, Claudio Casetti, Member, IEEE, Carla-FabianaChiasserini, Senior Member, IEEE,PanagiotisPapadimitratos, Member, IEEE , "Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks".
  • P. P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J. -P. Hubaux, "Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking," IEEE Communications Magazine, vol. 46, no. 2, 2008.
  • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in International Conference on Computer Communications (Infocom), 2003.
  • S. Capkun, L. Buttyan, and J. Hubaux, "SECTOR: secure tracking of node encounters in multi-hop wireless networks," in ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
  • M. Poturalski, P. Papadimitratos, and J. Hubaux, "Secure neighbor discovery in wireless networks: formal investigation of possibility," in ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008.
  • J. -H. Song, V. Wong, V. Leung, "Secure Location Verification for Vehicular Ad-Hoc Networks," IEEE Globecom, New Orleans, LO, Dec. 2008.
  • T. Leinm¨uller, C. Maih¨ofer, E. Schoch, F. Kargl, "Improved Security in Geographic Ad Hoc Routing through Autonomous Position Verification," ACM VANET, Los Angeles, CA, Sept. 2006.
  • In Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols, Irshad Ullah, Shoaib Ur Rehman
  • , presented hoe the backhole security threat affect on network. So a new scheme is represented which support for both proactive and reactive. So overcome traffic.
  • In MANET: Vulnerabilities, Challenges, Attacks, Application, Priyanka Goyal, Vinti Parmar, Rahul Rishi
  • , discuss how efficiently MANET works but after certain limits there are also created some challenges like limited bandwidth, battery power, computational power, and security. A new method is used to discussed vulnerabilities, application, and security aspects in MANET.