Abstract
Wireless Ad hoc networks represent a form of cooperative networking through peer to peer behavior with others nodes in the networks. Hop by hop communication is default way of communication. Most of the communications are localized and interaction among local nodes requires local security provisioning. In the absence of any centralized certification authority and absence of viable localization and synchronization hardware, schematic localization and periodic refreshing proved to be a feasible solution. Several solutions have exploited GPS based localization and periodic refreshing cycles to provide a viable security solution for wireless ad hoc networks. In this paper, we have proposed an accelerated hashing mechanism with schematic localization based on variable or multiple transmission range of few nodes. The solution has been simulated for evaluated for performance parameters like connectivity, storage overhead and computation.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. IEEE Comput. Netw. 38(4), 393–422 (2002)
Traynor, P., Kumar, R., Choi, H., Cao, G., Zhu, S., La Porta, T.: Efficient hybrid security mechanism for heterogeneous sensor networks. IEEE Trans. Mob. Comput. 6(6), 663–677 (2007)
Gu, W., Dutta, N., Chellappan, S., Bai, X.: Providing end-to-end secure communications in wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 8(3), 205–218 (2011)
Kumar, K., Verma, A.K., Patel, R.B.: A location dependent connectivity guarantee key management scheme for heterogeneous wireless sensor networks. J. Adv. Inf. Technol. 3(3), 105–115 (2010)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)
Ferng, H.W., Nurhakim, J., Horng, S.J.: Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Netw. 20(4), 625–637 (2014)
Khan, Z.S., Moharram, M.M., Alaraj, A., Azam, F.: A group based key sharing and management algorithm for vehicular ad hoc networks. Sci. World J. 2014, 1–8 (2014)
Cui, B., Wang, Z., Zhao, B., Liang, X., Ding, Y.: Enhanced key management protocols for wireless sensor networks. Mob. Inf. Syst. 2015, 1–10 (2015)
Chauhan, K.K., Tapaswi, S.: A secure key management system in group structured mobile Ad hoc Networks. In: Proceedings of the International Conference on IEEE Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, pp. 307–311, 25–27 June 2010
Cho, J.H., Chen, R., Chan, K.S.: Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw. 44, 58–75 (2016)
Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4), 760–769 (2008)
Lu, R., Cao, Z., Wang, L., Sun, C.: A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comp. Stand. Inter. 29(5), 521–527 (2007)
Friginal, J., de Andrés, D., Ruiz, J.C., MartÃnez, M.: REFRAHN: a resilience evaluation framework for ad hoc routing protocols. Comput. Netw. 82, 114–134 (2015)
Patwardhan, A., Parker, J., Iorga, M., Joshi, A., Karygiannis, T., Yesha, Y.: Threshold-based intrusion detection in ad hoc networks and secure AODV. Ad Hoc Netw. 6(4), 578–599 (2008)
Akbani, R., Korkmaz, T., Raju, G.V.S.: HEAP: a packet authentication scheme for mobile ad hoc networks. Ad Hoc Netw. 6(7), 1134–1150 (2008)
Bhalaji, N., Shanmugam, A.: Dynamic Trust based method to mitigate grey hole attack in mobile adhoc networks. Procedia Eng. 30, 881–888 (2012)
Chauhan, K.K., Sanger, A.K.S.: Securing mobile Ad hoc networks: key management and routing, May 2012. arXiv preprint: arXiv:1205.2432
Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014)
Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun. 1(4), 660–670 (2000)
Karp, B., Kung, H.T.: GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 243–254. ACM, New York (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A., Kumar, V., Kumar, K. (2016). A Localization Based Resilience Enhancement in Ad Hoc and Wireless Sensor Networks. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds) Smart Trends in Information Technology and Computer Communications. SmartCom 2016. Communications in Computer and Information Science, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-10-3433-6_54
Download citation
DOI: https://doi.org/10.1007/978-981-10-3433-6_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3432-9
Online ISBN: 978-981-10-3433-6
eBook Packages: Computer ScienceComputer Science (R0)