Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2016, Article ID 3596345, 12 pages
Research Article

Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs

1Department of Information Technology, Anna University, Chennai, Tamil Nadu 600025, India
2Department of Computer Science and Engineering, Adhiparasakthi College of Engineering, Vellore, Tamil Nadu 603319, India
3Department of Computer Science, College of Computer Science, King Khalid University, Abha 62529, Saudi Arabia
4Department of Electronics and Communication Engineering, PRIST University, Thanjavur, Tamil Nadu 613403, India

Received 5 August 2015; Accepted 12 November 2015

Academic Editor: Juan M. Corchado

Copyright © 2016 Anitha Veerasamy et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Dahill, B. Levine, E. Royer, and C. Shields, “A secure routing protocol for ad hoc networks,” Tech. Rep. 01-37, University of Massachusetts, 2000. View at Google Scholar
  2. P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS '02), San Antonio, Tex, USA, January 2002.
  3. Y. Zheng, Z. Peng, and V. Teemupekka, Trust Evaluation Based Security Solution in Ad Hoc Networks, Nokia Research Centre, 2006.
  4. K. C. Joshi and D. Pant, “Security of mobile Ad-hoc networks with five layer security architecture,” Institute of Technical Teachers, 2010.
  5. M. Saleh and L. Dong, “Real-time scheduling with security enhancement for packet switched networks,” IEEE Transactions on Network and Service Management, vol. 10, no. 3, pp. 271–285, 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Liu and M. Yu, “AASR: authenticated anonymous secure routing for MANETs in adversarial environments,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4585–4593, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Abdelhakim, L. E. Lightfoot, J. Ren, and T. Li, “Distributed detection in mobile access wireless sensor networks under byzantine attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 950–959, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. M. S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, “Sybil nodes detection based on received signal strength variations within VANET,” International Journal of Network Security, vol. 9, no. 1, pp. 22–33, 2009. View at Google Scholar · View at Scopus
  9. P. T. V. Bhuvaneswari, S. Karthikeyan, B. Jeeva, and M. A. Prasath, “An efficient mobility based localization in underwater sensor networks,” in Proceedings of the 4th International Conference on Computational Intelligence and Communication Networks, pp. 90–94, IEEE, Mathura, India, November 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. W. Heiko and J. Schiller, “Distance-based distributed multihop localization in mobile wireless sensor networks,” in 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, Hamburg, Germany, August 2009,
  11. A. Karma and J. Choudhary, “MPLI: a novel modified parametric location identification for AODV in MANET,” International Journal of Computer Applications, vol. 100, no. 4, pp. 48–53, 2014. View at Publisher · View at Google Scholar
  12. Z. Zhu, W. Guan, L. Liu, S. Li, S. Kong, and Y. Yan, “A multi-hop localization algorithm in underwater wireless sensor networks,” in Proceedings of the 6th International Conference on Wireless Communications and Signal Processing (WCSP '14), pp. 1–6, IEEE, Hefei, China, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Li, B. Halder, P. Stoica, and M. Viberg, “Computationally efficient angle estimation for signals with known waveforms,” IEEE Transactions on Signal Processing, vol. 43, no. 9, pp. 2154–2163, 1995. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Venkata and M. Singhal, “Angular routing protocol for mobile ad-hoc networks,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW '05), Columbus, Ohio, USA, June 2005.
  15. A. Boukerche, H. A. B. F. Oliveira, E. F. Nakamura, and A. A. F. Loureiro, “Localization systems for wireless sensor networks,” IEEE Wireless Communications, vol. 14, no. 6, pp. 6–12, 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. T.-F. Shih and H.-C. Yen, “Location-aware routing protocol with dynamic adaptation of request zone for mobile ad hoc networks,” Wireless Networks, vol. 14, no. 3, pp. 321–333, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. P. K. Suri, M. K. Soni, and P. Tomar, “Framework for location based power aware routing in MANET,” IJCSI International Journal of Computer Science Issues, vol. 8, no. 3, 2011. View at Google Scholar
  18. L. Cheng, C. Wu, Y. Zhang, H. Wu, M. Li, and C. Maple, “A survey of localization in wireless sensor network,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 962523, 12 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. R. M. Chamundeeswari and P. Sumathi, “Efficient detection of intrusion using inner and outer boundary models with transductive learning concept in mobile Adhoc network,” International Journal of Scientific & Engineering Research, vol. 5, no. 6, 2014. View at Google Scholar
  20. A. Singh, D. Dagon, and A. L. M. Dos Santos, “Authentication protocols making use of context free grammar: guessing strings,” Tech. Rep. GIT-CERCS-04-24, Georgia Institute of Technology, Atlanta, Ga, USA, 2004. View at Google Scholar
  21. S. C. Geyik and B. K. Szymanski, “Event recognition in sensor networks by means of grammatical inference,” in Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM '09), pp. 900–908, IEEE, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar
  22. S. Jadhav and U. L. Kulkarni, “Natural language database interface with probabilistic context free grammar,” IJRIT: International Journal of Research in Information Technology, vol. 2, no. 6, pp. 119–126, 2014. View at Google Scholar