Skip to main content

A Localization Based Resilience Enhancement in Ad Hoc and Wireless Sensor Networks

  • Conference paper
  • First Online:
Smart Trends in Information Technology and Computer Communications (SmartCom 2016)

Abstract

Wireless Ad hoc networks represent a form of cooperative networking through peer to peer behavior with others nodes in the networks. Hop by hop communication is default way of communication. Most of the communications are localized and interaction among local nodes requires local security provisioning. In the absence of any centralized certification authority and absence of viable localization and synchronization hardware, schematic localization and periodic refreshing proved to be a feasible solution. Several solutions have exploited GPS based localization and periodic refreshing cycles to provide a viable security solution for wireless ad hoc networks. In this paper, we have proposed an accelerated hashing mechanism with schematic localization based on variable or multiple transmission range of few nodes. The solution has been simulated for evaluated for performance parameters like connectivity, storage overhead and computation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. IEEE Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Traynor, P., Kumar, R., Choi, H., Cao, G., Zhu, S., La Porta, T.: Efficient hybrid security mechanism for heterogeneous sensor networks. IEEE Trans. Mob. Comput. 6(6), 663–677 (2007)

    Article  Google Scholar 

  3. Gu, W., Dutta, N., Chellappan, S., Bai, X.: Providing end-to-end secure communications in wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 8(3), 205–218 (2011)

    Article  Google Scholar 

  4. Kumar, K., Verma, A.K., Patel, R.B.: A location dependent connectivity guarantee key management scheme for heterogeneous wireless sensor networks. J. Adv. Inf. Technol. 3(3), 105–115 (2010)

    Google Scholar 

  5. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)

    Article  Google Scholar 

  6. Ferng, H.W., Nurhakim, J., Horng, S.J.: Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Netw. 20(4), 625–637 (2014)

    Article  Google Scholar 

  7. Khan, Z.S., Moharram, M.M., Alaraj, A., Azam, F.: A group based key sharing and management algorithm for vehicular ad hoc networks. Sci. World J. 2014, 1–8 (2014)

    Google Scholar 

  8. Cui, B., Wang, Z., Zhao, B., Liang, X., Ding, Y.: Enhanced key management protocols for wireless sensor networks. Mob. Inf. Syst. 2015, 1–10 (2015)

    Google Scholar 

  9. Chauhan, K.K., Tapaswi, S.: A secure key management system in group structured mobile Ad hoc Networks. In: Proceedings of the International Conference on IEEE Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, pp. 307–311, 25–27 June 2010

    Google Scholar 

  10. Cho, J.H., Chen, R., Chan, K.S.: Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw. 44, 58–75 (2016)

    Article  Google Scholar 

  11. Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4), 760–769 (2008)

    Article  Google Scholar 

  12. Lu, R., Cao, Z., Wang, L., Sun, C.: A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comp. Stand. Inter. 29(5), 521–527 (2007)

    Article  Google Scholar 

  13. Friginal, J., de Andrés, D., Ruiz, J.C., Martínez, M.: REFRAHN: a resilience evaluation framework for ad hoc routing protocols. Comput. Netw. 82, 114–134 (2015)

    Google Scholar 

  14. Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., Yesha, Y.: Threshold-based intrusion detection in ad hoc networks and secure AODV. Ad Hoc Netw. 6(4), 578–599 (2008)

    Article  Google Scholar 

  15. Akbani, R., Korkmaz, T., Raju, G.V.S.: HEAP: a packet authentication scheme for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1134–1150 (2008)

    Article  Google Scholar 

  16. Bhalaji, N., Shanmugam, A.: Dynamic Trust based method to mitigate grey hole attack in mobile adhoc networks. Procedia Eng. 30, 881–888 (2012)

    Article  Google Scholar 

  17. Chauhan, K.K., Sanger, A.K.S.: Securing mobile Ad hoc networks: key management and routing, May 2012. arXiv preprint: arXiv:1205.2432

  18. Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014)

    Google Scholar 

  19. Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun. 1(4), 660–670 (2000)

    Article  Google Scholar 

  20. Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 243–254. ACM, New York (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kumar, A., Kumar, V., Kumar, K. (2016). A Localization Based Resilience Enhancement in Ad Hoc and Wireless Sensor Networks. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_54

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3433-6_54

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3432-9

  • Online ISBN: 978-981-10-3433-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics