Energy awareness for computation and protocol management is becoming a crucial factor in the design of MANET protocols and algorithms. Because of mobility, we need the support of scalable routing strategies and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce fake neighbor position for route discovery. Often energy saving and path duration and stability can be two contrasting efforts and trying to satisfy both of them can be very difficult because such a process can be easily abused or disrupted by adversarial nodes. Neighbor discovery is an important part of many protocols for mobile ad hoc networks, including localization and routing. Communications and protocols performance will depreciate, when neighbor discovery fails. In this paper, we address this open issue by proposing secure and efficient neighbor discovery with respect to select the most stable path so as to reduce the overhead due to route reconstruction and link failures, which offers a measure of protection against fake positions by allowing participating mobile nodes to securely determine if they are neighbors.We prove the security properties of our protocol, and demonstrate the effectiveness of our protocol through GLOMOSIM simulations.
IndexTerms: MANET,Neighbor discovery, position verification, path stability.
Wireless Mobile Ad Hoc Networks (MANETs) have emerged as an advanced networking concept based on collaborative efforts among numerous self-organized wireless devices. MANET is a network where no fixed infrastructure exists. Such networks are expected to play vital role in future civilian and military settings, being useful to provide communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable and movement of communicating parties is possible. The topology of MANETs is dynamic, because the link among the nodes may vary with time due to device mobility, new device arrivals, and the possibility of having mobile devices. Hence, any routing protocol design must consider the physical limitations and constraints imposed by the ad hoc environment so that the resulting routing protocol does not degrade system performances. Since in MANET, there is no fixed-infrastructure such as base stations, mobile devices need to operate as routers in order to maintain the information about the network connectivity, as a result the conventional routing protocols cannot be supported easily by ad hoc networks. Several research studies have been launched to study this issue, those defined by the IETF MANET group can be classified into two categories: proactive protocols and reactive protocols. MANET’s technology offers both new challenges and opportunities for many applications. The major challenges for ad hoc technology is secure and efficient routing, due essentially to MANET features (e.g., open medium, lack of centralized management, nodes...