Location based services in wireless ad hoc networks

作者: Neelanjana Dutta

DOI:

关键词:

摘要: In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects i) privacy sensor (privacy), ii) end-to-end secure communication randomly deployed (security), iii) quality versus latency trade-off content retrieval under node mobility (performance) and iv) clustering Sybil attack detection vehicular (trust). The first contribution of dissertation is addressing networks. We propose a non-cooperative localization algorithm showing how an external entity can stealthily invade into the sensors network. then design preserving tracking for defending against such adversarial attacks. Next Here, due to lack control on sensors’ locations post deployment, pre-fixing pairwise keys between not feasible especially larger scale random deployments. Towards premise, differentiated key pre-distribution endto-end communication, show it improves existing routing algorithms. Our next mobility. two-tiered architecture efficient environment. Finally A attacker create use multiple counterfeit identities risking trust network, easily escape avoiding detection. nodes leveraging vehicle platoon dispersion attacks

参考文章(143)
Akbar M. Sayeed, Yu H. Hu, Dan Li, Kerry D. Wong, Detection, Classification and Tracking of Targets in Distributed Sensor Networks ,(2002)
Dr C, Dr. A., Survey of Wireless MANET Application in Battlefield Operations International Journal of Advanced Computer Science and Applications. ,vol. 2, ,(2011) , 10.14569/IJACSA.2011.020108
Rehan Akbani, Turgay Korkmaz, G. V. S. Raju, Mobile Ad-Hoc Networks Security Recent Advances in Computer Science and Information Engineering. pp. 659- 666 ,(2012) , 10.1007/978-3-642-25769-8_92
Bart Dhoedt, Ingrid Moerman, Jeroen Hoebeke, Piet Demeester, An overview of mobile ad hoc networks: applications and challenges Journal of The Communications Network. ,vol. 3, pp. 60- 66 ,(2004)
Rasheed Hussain, Sangjin Kim, Heekuck Oh, Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice workshop on information security applications. pp. 296- 311 ,(2012) , 10.1007/978-3-642-35416-8_21
P. Ning, D. Liu, Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks network and distributed system security symposium. ,(2002)
Erik G. Nilsson, Ketil Stølen, Ad Hoc Networks and Mobile Devices in Emergency Response – A Perfect Match? ad hoc networks. pp. 17- 33 ,(2010) , 10.1007/978-3-642-17994-5_2
Biswajit Panja, Sanjay Kumar Madria, An energy and communication efficient group key in sensor networks using elliptic curve polynomial ad hoc mobile and wireless networks. pp. 153- 171 ,(2007) , 10.1007/978-3-540-74823-6_12
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Jooyoung Lee, Douglas R. Stinson, Deterministic Key Predistribution Schemes for Distributed Sensor Networks Selected Areas in Cryptography. pp. 294- 307 ,(2004) , 10.1007/978-3-540-30564-4_21