EMBN-MANET: A method to Eliminating Malicious Beacon Nodes in Ultra-Wideband (UWB) based Mobile Ad-Hoc Network

被引:2
作者
Kuriakose, Jeril [1 ]
Joshi, Sandeep [1 ]
Bairwa, Amit Kumar [1 ]
机构
[1] Manipal Univ Jaipur, Jaipur, India
关键词
MANET; Security; Wireless; Attack; Optimization; Trust; Beacon nodes; LOCALIZATION; SECURITY;
D O I
10.1016/j.adhoc.2022.103063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent breakthroughs in microelectromechanical systems, microsystem technologies, and wireless communica-tions have made energy-efficient, inexpensive, off-the-shelf devices that unambiguously carry data without communication overhead practical. UWB radio technology employs minimal energy for short-range, high -bandwidth communications throughout a large section of the radio. Mobile computing organizations now explore mobile ad-hoc networks. Decentralized networks communicate. Peer nodes enable wireless device -to-device communication. Location-based and location-aided routing improve ad hoc routing. Physical or involuntary configuration places mobile nodes during deployment. Large networks need too much manual setup. GPS receivers for each sensor unit would significantly increase network installation costs. It inspired non-GPS and non-physical configuration localization. Most localization systems use beacon nodes. Beacon nodes are unique. Standard security approaches block secure beacon nodes, which might compromise localization. This research investigates beacon node localization issues and attacks. We constructed a statistical model to detect rogue beacon nodes in the ad hoc network and studied how various attacks affect localization. Bogus beacon nodes find mobile nodes. We enabled malicious beacon node communication. Trilateration and Received Signal Strength Indicator found unknown nodes. Trilateration detects compromised beacon nodes. The algorithm finds malicious beacon nodes. Our experiments removed 90% of compromised beacon nodes. Our flexible localization technique allows several algorithms and range methods without time complexity. Location identification affected fake beacon nodes.
引用
收藏
页数:16
相关论文
共 53 条
  • [1] A review of forest fire surveillance technologies: Mobile ad-hoc network routing protocols perspective
    Al-Dhief, Fahad Taha
    Sabri, Naseer
    Fouad, S.
    Latiff, N. M. Abdul
    Albader, Musatafa Abbas Abbood
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (02) : 135 - 146
  • [2] A novel framework for prognostic factors identification of malignant mesothelioma through association rule mining
    Alam, Talha Mahboob
    Shaukat, Kamran
    Hameed, Ibrahim A.
    Khan, Wasim Ahmad
    Sarwar, Muhammad Umer
    Iqbal, Farhat
    Luo, Suhuai
    [J]. BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2021, 68
  • [3] AlHajri M, 2018, Arxiv, DOI arXiv:1806.05765
  • [4] [Anonymous], 2000, SYST SCI P 33 ANN HA
  • [5] Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
  • [6] Bairwa Amit Kumar, 2022, Data Engineering for Smart Systems: Proceedings of SSIC 2021. Lecture Notes in Networks and Systems (238), P183, DOI 10.1007/978-981-16-2641-8_17
  • [7] Mutual authentication of nodes using session token with fingerprint and MAC address validation
    Bairwa, Amit Kumar
    Joshi, Sandeep
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (04) : 479 - 491
  • [8] Dingo Optimizer: A Nature-Inspired Metaheuristic Approach for Engineering Problems
    Bairwa, Amit Kumar
    Joshi, Sandeep
    Singh, Dilbag
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [9] Bairwa Amit Kumar, 2020, Ingeniare. Rev. chil. ing., V28, P558
  • [10] A localization technique for ensemble Kalman filters
    Bergemann, Kay
    Reich, Sebastian
    [J]. QUARTERLY JOURNAL OF THE ROYAL METEOROLOGICAL SOCIETY, 2010, 136 (648) : 701 - 707