<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn>
<issn pub-type="ppub">0868-4952</issn>
<issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFOR402</article-id>
<article-id pub-id-type="doi">10.15388/20-INFOR402</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>Location Verification Technique for Cluster Based Geographical Routing in MANET</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Muthusenthil</surname><given-names>Balasubramanian</given-names></name><email xlink:href="muthusenthilb.cse@valliammai.co.in">muthusenthilb.cse@valliammai.co.in</email><xref ref-type="aff" rid="j_infor402_aff_001">1</xref><xref ref-type="aff" rid="j_infor402_aff_002">2</xref><xref ref-type="corresp" rid="cor1"/><bio>
<p><bold>B. Muthusenthil</bold> received the bachelor’s degree in electronics communication engineering from Madras University in 1996, master’s degree from Satyabama University in 2007, doctorate from Anna University, Chennai, India, in 2016. Currently, he is a research scientist in Wookyoung Information Technology, Daegu, South Korea, and and associate professor at Valliammai Engineering College, Chennai. His interests are mobile ad-hoc networks, network security, video security, network attacks, privacy preservation, trust evaluation and cloud computing. He is affiliated with scientific publications and has served as an invited reviewer for many journals. Besides, he is also involved in NGOs, student associations, and managing of non-profit foundations.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Kim</surname><given-names>Hyunsung</given-names></name><email xlink:href="kim@kiu.ac.kr">kim@kiu.ac.kr</email><xref ref-type="aff" rid="j_infor402_aff_003">3</xref><bio>
<p><bold>H. Kim</bold> received his MSc and PhD degrees in computer engineering from Kyungpook National University, Republic of Korea, in 1998 and 2002, respectively. From 2000 to 2002, he worked as a senior researcher at Ditto Technology. He had been an associate professor from 2002 to 2011 with the Department of Computer Engineering, Kyungil University. Currently, he is a professor at the Department of Cyber Security, Kyungil University. His current research interests are cryptography, VLSI, security protocols, network security and ubiquitous computing security.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Prasath</surname><given-names>V.B. Surya</given-names></name><email xlink:href="prasatsa@uc.edu">prasatsa@uc.edu</email><xref ref-type="aff" rid="j_infor402_aff_004">4</xref><xref ref-type="aff" rid="j_infor402_aff_005">5</xref><xref ref-type="aff" rid="j_infor402_aff_006">6</xref><xref ref-type="aff" rid="j_infor402_aff_007">7</xref><bio>
<p><bold>V.B.S. Prasath</bold> is a mathematician with expertise in the application areas of image processing, computer vision, machine learning and data science. He received his PhD in mathematics from the Indian Institute of Technology Madras, India, in 2009. He has been a postdoctoral fellow at the Department of Mathematics, University of Coimbra, Portugal, for two years, from 2010 to 2011. From 2012 to 2015 he was a postdoctoral fellow at the Computational Imaging and VisAnalysis (CIVA) Lab, University of Missouri, USA, and from 2016 to 2017 he was an assistant research professor at the same institution. He is currently an assistant professor at the Division of Biomedical Informatics, Cincinnati Children’s Hospital Medical Center, and at the Departments of Biomedical Informatics, Electrical Engineering and Computer Science, University of Cincinnati, from 2018. He had summer fellowships/visits at Kitware Inc. NY, USA, The Fields Institute, Canada, and IPAM, University of California Los Angeles (UCLA), USA. His main research interests include nonlinear PDEs, regularization methods, inverse and ill-posed problems, variational, PDE based image processing, and computer vision with applications in remote sensing, biomedical imaging domains. His current research focuses are data science, bioimage informatics with machine learning techniques based image processing, and computer vision with applications in remote sensing, bio-medical imaging, and biometrics domains.</p></bio>
</contrib>
<aff id="j_infor402_aff_001"><label>1</label>Department of Computer Science and Engineering, <institution>Valliammai Engineering College</institution>, <country>India</country></aff>
<aff id="j_infor402_aff_002"><label>2</label><institution>Information Security Research Institute</institution>, Wookyoung Information Technology, Daegu, <country>Republic of Korea</country></aff>
<aff id="j_infor402_aff_003"><label>3</label>Department of Cyber Security, <institution>Kyungil University</institution>, <country>Republic of Korea</country></aff>
<aff id="j_infor402_aff_004"><label>4</label>Division of Biomedical Informatics, <institution>Cincinnati Children’s Hospital Medical Center</institution>, OH 45229, <country>USA</country></aff>
<aff id="j_infor402_aff_005"><label>5</label>Department of Pediatrics, <institution>University of Cincinnati College of Medicine</institution>, Cincinnati, OH, <country>USA</country></aff>
<aff id="j_infor402_aff_006"><label>6</label>Department of Biomedical Informatics, College of Medicine, <institution>University of Cincinnati</institution>, OH 45267, <country>USA</country></aff>
<aff id="j_infor402_aff_007"><label>7</label>Department of Electrical Engineering and Computer Science, <institution>University of Cincinnati</institution>, OH 45221, <country>USA</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>*</label>Corresponding author. </corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2020</year></pub-date>
<pub-date pub-type="epub"><day>23</day><month>3</month><year>2020</year></pub-date>
<volume>31</volume><issue>1</issue><fpage>113</fpage><lpage>130</lpage>
<history>
<date date-type="received"><month>3</month><year>2018</year></date>
<date date-type="accepted"><month>12</month><year>2019</year></date>
</history>
<permissions><copyright-statement>© 2020 Vilnius University</copyright-statement><copyright-year>2020</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/"><license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>In mobile ad hoc network (MANET), routing has been the main issue because its high mobility and maintaining its routing structures are important requirements. Geographical routing mostly relies on real time location information, however, there exist lags in correctness of location information, and malicious nodes can cause troubles in accurate location tracking in the network. In order to ensure the correctness of location update information, in this paper, we propose a novel design based on a cluster based geographic routing (CBGR) formulation (Muthusenthil and Murugavalli, <xref ref-type="bibr" rid="j_infor402_ref_010">2014</xref>), wherein we add a position verification technique based on a direct symmetry test (DST) to securely verify the location claims. We further introduce a new noise threshold parameter in the CBGR formulation to evaluate the correctness of location information based on a DST. Then a location based encryption scheme is employed to protect the estimated location against the eavesdropping attacks. With our simulation results, we show that the proposed location verification technique for CBGR (LVT-CBGR) network enhances the network security and performs better compared to other protocols in terms of performance metrics. The experimental outcomes illustrate the fact that our approach is well-geared to scale down the overall network expenditure.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>mobile ad hoc network (MANET)</kwd>
<kwd>location based routing</kwd>
<kwd>geographical routing</kwd>
<kwd>direct symmetry test</kwd>
<kwd>location attacks</kwd>
</kwd-group>
<funding-group>
<award-group>
<funding-source xlink:href="https://doi.org/10.13039/501100003725">National Research Foundation of Korea</funding-source>
<award-id>NRF-2010-0021575</award-id>
<award-id>NRF-2017R1D1A1B04032598</award-id>
</award-group>
<funding-statement>This work was partially supported by the National Research Foundation of Korea Grand funded by the Korean Government (MEST) (NRF-2010-0021575) and by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2017R1D1A1B04032598).</funding-statement>
</funding-group>
</article-meta>
</front>
<body>
<sec id="j_infor402_s_001">
<label>1</label>
<title>Introduction</title>
<p>An ad hoc network consists of a set of wireless mobile nodes to form a network cooperatively without any specific configuration or administration. A mobile ad hoc network (MANET) is a particular variant of a wireless network where the mobile hosts are connected wirelessly and form an unfixed infrastructure based temporary network. By forming a multi-hop radio network, the MANET nodes communicate to each other. The mobile node operates as an intermediate router. A number of hops are utilized to carry the data packets sent by a source node to reach a destination node. Due to this property, multi-hops are common in data communication and the final quality highly depends on node cooperation (Lin and Labiod, <xref ref-type="bibr" rid="j_infor402_ref_006">2006</xref>). MANETs have been applied to various application areas including emergency search, rescue locations, military battlefields, deployment in disaster areas, etc. Such application areas typically warrant rapid deployments with active re-configuration a necessity. These networks can also be deployed locally, that is in a confined local area, such as conference halls, sports stadiums, small aircrafts, taxicabs, boats etc. One of the main characteristics of an ad hoc network is usually a lack of resources such as limited bandwidth and/or battery power constraints. Hence, routing in a MANET setting is challenging and requires further research (Zou and Chigan, <xref ref-type="bibr" rid="j_infor402_ref_018">2009</xref>).</p>
<sec id="j_infor402_s_002">
<label>1.1</label>
<title>Geographical Routing in MANETS</title>
<p>In geographical routing mobile nodes in a network are able to ascertain their positions thanks to certain positioning systems such as a GPS, and a source can utilize some kind of location service to obtain the corresponding destinations. Intermediate nodes achieve forwarding decisions of packets using the knowledge of the immediate neighbour positions, and the source appends the destination’s position in the packet header. In a default setting, the data packets are forwarded greedily through to the neighbour nodes thereby allowing the greatest geographical progression toward the destination. However, whenever such a neighbour does not exist, forward is used to recover the local gap perimeter. In this case, the packets travel across the planar local topology subgraph of the network by using the right-hand rule and progress until greedy forwarding can be restarted again. Although better than a global topology-based routing, imprecise knowledge of a local geographical topology, as well as destination positions, reduces the geographical routing performance. In current geographical routing protocols, each mobile node of the network periodically broadcasts a positional beacon to achieve a local geographical topology. However, in high dynamical scenarios, such proactive protocols create a lot of control overhead information even when there is no traffic through the system, as well as outdated results of the topology. Furthermore, reliance on one-hop forwarding of topological information in these geographical routing protocols leads to sub-optimal forwarding and blind forwarding in current systems (Xiang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor402_ref_017">2007</xref>). In general, geographical routing utilizes node locations to identify viable paths to the nodes. Furthermore, nodes not only know their own locations but also their one-hop neighbours. Since the system follows geographical routing, the destinations are explicitly described geographically (a region or a location), with each packet holding a small amount (O, 1) of routing information in the systems (Rathidevi and Kumaran, <xref ref-type="bibr" rid="j_infor402_ref_014">2015</xref>).</p>
</sec>
<sec id="j_infor402_s_003">
<label>1.2</label>
<title>Location Verification Technique</title>
<p>Malicious nodes can affect the forwarding decisions and a location verification technique (LVT) is utilized to check the accuracy of given node positions collected in the neighbour information table. This technique avoids possible errors in node positions in MANET and it is paramount to verify the node positions in the neighbour before choosing the nodes for forwarding packets in the network. Accuracies of the locations can be assured by position verification technique that utilizes the positioning systems. This technique finds the appropriate neighbours for forwarding the packets. A major bottleneck is the precision of such selected neighbour nodes and the identification of the proper ones. This is crucial in avoiding malicious node selection by hackers when selecting non-neighbours as true neighbours. Neighbourhood discovery process, also called the verification, ensures that the selected node is indeed in the right neighbourhood. Thus, after identifying the reliable and dependable nodes, verification technique is performed since the selected nodes are considered for validating other nodes (Papadimitratos <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor402_ref_012">2008</xref>; Basha and Joshna, <xref ref-type="bibr" rid="j_infor402_ref_002">2014</xref>). Position verification can still result in false positive and false negative rates since there are different types of attacks that can happen in the network. Due to limited message reception in typical wireless network settings, it is in general not always feasible to validate neighbourhood nodes with the neighbourhood discovery approach. Malicious hackers can manipulate the network nodes to disrupt communication between different nodes. Also, this can lead to the precise determination of true neighbourhood nodes surrounding the source node (Papadimitratos <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor402_ref_012">2008</xref>). These misleading nodes, incorrectly identified as true neighbourhood nodes, lead to false position details at similar ranges (Basha and Joshna, <xref ref-type="bibr" rid="j_infor402_ref_002">2014</xref>).</p>
</sec>
<sec id="j_infor402_s_004">
<label>1.3</label>
<title>Previous Work and Proposed Solution</title>
<p>In prior research (Muthusenthil and Murugavalli, <xref ref-type="bibr" rid="j_infor402_ref_010">2014</xref>), a protocol based on location supported cluster based geographical routing (CBGR) is proposed for intermittently connected MANET. In the previous CBGR protocol, degree difference based node value, node mobility, and residual energy are used to choose the head of the cluster. In this setup, there is a node with global positioning system (GPS) and a node with antenna. Moreover, the cluster consists of at least one G-node that selects the cluster head based on the information of remaining energy, speed and mobility of the nodes. In the ad hoc networks, due to the mobility of nodes the cluster maintenance is used to dynamically reorganize and reconfigure the overall cluster, and a store-carry forward model along with the geographical routing protocol is utilized. At the end, a location verification update technique is used to prevent location errors due to routing. By extending the work in Muthusenthil and Murugavalli (<xref ref-type="bibr" rid="j_infor402_ref_010">2014</xref>) and the CBGR protocol, our goal here is to design a position verification technique for the cluster based geographical routing in order to ensure the correctness of location update information. We therefore propose a location verification technique for cluster based geographical routing (LVT-CBGR) with the following features: 
<list>
<list-item id="j_infor402_li_001">
<label>•</label>
<p>It is modelled for hierarchical geographical ad hoc networks and without relying on the trusted infrastructure.</p>
</list-item>
<list-item id="j_infor402_li_002">
<label>•</label>
<p>It allows all nodes to perform all verification process autonomously.</p>
</list-item>
<list-item id="j_infor402_li_003">
<label>•</label>
<p>It is executed by any node at any point of time (i.e. reactive).</p>
</list-item>
<list-item id="j_infor402_li_004">
<label>•</label>
<p>It is independent, lightweight and robust as it generates low overhead traffic.</p>
</list-item>
</list> 
We organize the rest of the work as follows. In Section <xref rid="j_infor402_s_005">2</xref> previous location verification for geographical routing methods are presented. Section <xref rid="j_infor402_s_006">3</xref> shows position verification technique for the cluster based geographical routing in order to ensure the correctness of location update information. Finally, Section <xref rid="j_infor402_s_012">4</xref> discusses the experimental simulations of the proposed approach, and Section <xref rid="j_infor402_s_015">5</xref> provides the conclusions of our work.</p>
</sec>
</sec>
<sec id="j_infor402_s_005">
<label>2</label>
<title>Related Works</title>
<p>We briefly review related ad hoc network modelling and location verification approaches that are relevant to the work presented here. Liu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_007">2010</xref>) studied a node-to-node location verification method, wherein they make use of pairs of neighbourhood nodes for detection and target in the network, and determine the target and position of every pair by using one detect node and two globally active detective nodes. For location determination the distance is calculated based on these nodes. The location claim validation that lets the detecting node to clarify the location declaration of TN is supported by recognizing the compromised TN with the false location declaration and safeguarding the benign TN from overhearing when transmitting messages with the help of a new location based encryption technique and by not needing any kind of pre-shared secret keys.</p>
<p>Lo <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_008">2013</xref>) have presented a geographical forwarding scheme for VANETs with location verification to determine the forwarding node in order to identify a proficient and steady node, in this case, a vehicle, so it can be used as a forwarding node in the network. After that, the calculation of link time, as well as the signal to noise ratio of the given signal, are used to affirm the chosen node is not only steady but also able to maintain longer persistent link time with the information providing nodes. To verify the location accuracy of surrounding nodes collected in the lookup table, a general verification technique is employed. Thanks to this location verifying technique, false nodes are found and can be removed immediately, and the vehicles that positively clear the verification test are selected as the successor forward node.</p>
<p>Fiore <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_005">2013</xref>) proposed to identify and verify neighbourhood node positions in a MANET setting by using a special verifier node that determines and validates the positional information. In this approach, the special verifier aggregates the details of one-hop neighbourhood nodes and computes neighbourhood distances between nodes. Nodes then communicate with ascertained neighbourhood nodes using broadcast of POLL and REPLY messages. It then records the overall communication time between two nodes. To execute the time of flight based ranging, the verifier node broadcasts a REVEAL message and the neighbourhood nodes propagate the REPORT message to the verifier node which consists of identity and timing information. This helps in estimating the neighbourhood nodes and verifier distances between them. With these results obtained, each node is categorized into faulty, unverifiable, verifiable if sufficient node details are not available.</p>
<p>Shen and Zhao (<xref ref-type="bibr" rid="j_infor402_ref_016">2013</xref>) studied a new protocol for MANETs using an anonymous location based efficient routing terms, abbreviated as ALERT. In their approach, the network is split into zones using the protocol with a sender or a forwarder node. GPSR algorithm is utilized in these zones to move data toward the forwarder nodes for developing a reliable and smart path for intermediate relay nodes. In the next step, message propagation reaches the destination zone nodes without identification details. In this model, the source is kept anonymous and without details for security purposes of not revealing the source and destinations. In a similar approach, to handle privacy, El Defrawy and Tsudik (<xref ref-type="bibr" rid="j_infor402_ref_003">2011</xref>) proposed a system called privacy-friendly routing in suspicious MANETs (PRISM). It works based on the global group signature approach, and a tracking resistant method is utilized for location based on forwarding across the network. The source node broadcasts a RREQ message that has the group signature and a time stamp. This further contains an encrypted version of a session key. The destination node then examines the validity of time stamp from the source node, and if it is valid, it provides the response RREP upon receiving RREQ. This again is further encrypted with the session key as before. If it is not valid, then the RREQ is discarded. Upon obtaining the RREP message, the source node decrypts it with the session key. Note that here the destination node provides the location information, as well as validates the signature that is being sent. Finally, in the scenario where RREP is cached and executed priorly, the source node drops RREP message altogether.</p>
<p>Adnan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_001">2017</xref>) have presented a bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Sheet <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_015">2017</xref>) proposes two layered location information verification cum security technique based on transferable belief model. Rajakumar <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_013">2017</xref>) proposed a method to search out the geographical position of unknown nodes with the help of anchor nodes in WSN using grey wolf optimization. Malandrino <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_009">2014</xref>) suggested server based approach A-VIP for location verification uses a trusted server to verify location claims which reduces the applicability due to increasing demand of distributed approach. Various location verification schemes have been discussed in detail.</p>
</sec>
<sec id="j_infor402_s_006">
<label>3</label>
<title>System Model</title>
<p>We describe our system model here and provide the details of our LVT based CBGR formulation along with metrics used to evaluate the overall system. We assume the evenly distributed nodes in the network with the network size of <inline-formula id="j_infor402_ineq_001">
<alternatives><mml:math><mml:mi mathvariant="italic">A</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">A</mml:mi></mml:math><tex-math><![CDATA[$
A\times A$]]></tex-math></alternatives></inline-formula> and the number of nodes with <inline-formula id="j_infor402_ineq_002">
<alternatives><mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="italic">j</mml:mi></mml:math><tex-math><![CDATA[$
n=i+j$]]></tex-math></alternatives></inline-formula>. The transmission range <inline-formula id="j_infor402_ineq_003">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">r</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{r_{i}}$]]></tex-math></alternatives></inline-formula> of the node <italic>i</italic> varies from 5 to 10 m. Figure <xref rid="j_infor402_fig_001">1</xref> shows the network configuration which consists of nodes <inline-formula id="j_infor402_ineq_004">
<alternatives><mml:math><mml:mi mathvariant="italic">NG</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NG}$]]></tex-math></alternatives></inline-formula> – nodes with GPS, and <inline-formula id="j_infor402_ineq_005">
<alternatives><mml:math><mml:mi mathvariant="italic">NA</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NA}$]]></tex-math></alternatives></inline-formula> – nodes with antennas. Furthermore, the network can be formed into clusters, and to save energy, the <inline-formula id="j_infor402_ineq_006">
<alternatives><mml:math><mml:mi mathvariant="italic">NG</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NG}$]]></tex-math></alternatives></inline-formula> nodes may go to sleep or change to wake-up modes periodically. The <inline-formula id="j_infor402_ineq_007">
<alternatives><mml:math><mml:mi mathvariant="italic">NA</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NA}$]]></tex-math></alternatives></inline-formula> nodes have enough capacity to send and receive signals to and from other nodes. These nodes also compute, from other nodes in the network, the received signal strength and the angle of arrival of the received signal information.</p>
<fig id="j_infor402_fig_001">
<label>Fig. 1.</label>
<caption>
<p>Architecture setup of the proposed model.</p>
</caption>
<graphic xlink:href="infor402_g001.jpg"/>
</fig>
<p>In the network studied here we consider all the other nodes as communication nodes that can be reached directly from a node under consideration. In order to achieve this, we have made the following assumptions in this work:</p>
<list>
<list-item id="j_infor402_li_005">
<label>1.</label>
<p>Each node knows its own position thanks to GPS receivers and shares ir with other nodes with maximum tolerance and ranging error.</p>
</list-item>
<list-item id="j_infor402_li_006">
<label>2.</label>
<p>Node positions do not vary during message exchange which takes place in less than few ms.</p>
</list-item>
<list-item id="j_infor402_li_007">
<label>3.</label>
<p>Each node carries unique identity authenticated by location based encryption scheme.</p>
</list-item>
</list>
<sec id="j_infor402_s_007">
<label>3.1</label>
<title>Overview of the Architecture</title>
<p>In this work, we study a design with location verification technique for the cluster based geographical routing (LVT-CBGR) in MANET. In this technique, a direct symmetry test (DST) is used to securely verify the location claims. Then a location based encryption scheme is employed to protect the estimated location against the eavesdropping attacks. Note that our network architecture consists of the cluster head (<inline-formula id="j_infor402_ineq_008">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula>) and the cluster member (<inline-formula id="j_infor402_ineq_009">
<alternatives><mml:math><mml:mi mathvariant="italic">CM</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CM}$]]></tex-math></alternatives></inline-formula>) as the main entities. 
<def-list><def-item><term><bold>Cluster head (</bold> <inline-formula id="j_infor402_ineq_010">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CH}_{i}}$]]></tex-math></alternatives></inline-formula><bold>):</bold></term><def>
<p>This is the coordinating node in each of the clusters. Here, we make an assumption that only <inline-formula id="j_infor402_ineq_011">
<alternatives><mml:math><mml:mi mathvariant="italic">NA</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NA}$]]></tex-math></alternatives></inline-formula> node could be a candidate for the cluster head. Any <inline-formula id="j_infor402_ineq_012">
<alternatives><mml:math><mml:mi mathvariant="italic">NA</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NA}$]]></tex-math></alternatives></inline-formula> node that has the maximum weight factor but a smaller mobility factor in a cluster could be selected as the cluster head.</p></def></def-item><def-item><term><bold>Cluster member (</bold> <inline-formula id="j_infor402_ineq_013">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{i}}$]]></tex-math></alternatives></inline-formula><bold>):</bold></term><def>
<p>These nodes represent members of the network and perform some processing, gathering information and communicating with the cluster head in the network. Any <inline-formula id="j_infor402_ineq_014">
<alternatives><mml:math><mml:mi mathvariant="italic">NA</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NA}$]]></tex-math></alternatives></inline-formula> or <inline-formula id="j_infor402_ineq_015">
<alternatives><mml:math><mml:mi mathvariant="italic">NG</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NG}$]]></tex-math></alternatives></inline-formula> nodes which are attached to <inline-formula id="j_infor402_ineq_016">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula> exclusively in each cluster could be member nodes.</p></def></def-item></def-list> We design the following transmission model based on the above main entities. This transmission occurs between a source node (<inline-formula id="j_infor402_ineq_017">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">S</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{S}}}$]]></tex-math></alternatives></inline-formula>) and a destination node (<inline-formula id="j_infor402_ineq_018">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{D}}}$]]></tex-math></alternatives></inline-formula>), and can be summarized as: 
<list>
<list-item id="j_infor402_li_008">
<label>1.</label>
<p>If <inline-formula id="j_infor402_ineq_019">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">S</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{S}}}$]]></tex-math></alternatives></inline-formula> is located within the transmission range of <inline-formula id="j_infor402_ineq_020">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{D}}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor402_ineq_021">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">S</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{S}}}$]]></tex-math></alternatives></inline-formula> propagates the packet information to <inline-formula id="j_infor402_ineq_022">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{D}}}$]]></tex-math></alternatives></inline-formula>. This is done via the cluster head <inline-formula id="j_infor402_ineq_023">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">S</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CH}_{\mathrm{S}}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_009">
<label>2.</label>
<p>If <inline-formula id="j_infor402_ineq_024">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{D}}}$]]></tex-math></alternatives></inline-formula> is not within the transmission range of <inline-formula id="j_infor402_ineq_025">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">S</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{S}}}$]]></tex-math></alternatives></inline-formula>, then the packet information is sent to the in the direction of <inline-formula id="j_infor402_ineq_026">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{D}}}$]]></tex-math></alternatives></inline-formula> via the intermediate cluster heads.</p>
</list-item>
</list>
</p>
</sec>
<sec id="j_infor402_s_008">
<label>3.2</label>
<title>Metrics Utilized for Estimation in the Network</title>
<p>We describe the main metrics utilized for network estimation and also further introduce a new noise threshold criteria that is not considered in the prior works (Muthusenthil and Murugavalli, <xref ref-type="bibr" rid="j_infor402_ref_011">2017</xref>). This helps us to evaluate the correctness of location information based on the direct symmetry test (DST). Table <xref rid="j_infor402_tab_001">1</xref> lists the parameters that are presented here. 
<table-wrap id="j_infor402_tab_001">
<label>Table 1</label>
<caption>
<p>Summary of notations and their representations used in this work.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Notation</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Representation of the symbol or symbol</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_027">
<alternatives><mml:math><mml:mi mathvariant="normal">Δ</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">d</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
\Delta {d_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Degree difference</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_028">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">ND</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{ND}_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Node degree</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><italic>z</italic></td>
<td style="vertical-align: top; text-align: left">Size of the cluster</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_029">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Node mobility</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_030">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">v</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({u_{1}},{v_{1}})$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_031">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">v</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({u_{2}},{v_{2}})$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Coordinates of the node <italic>i</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_032">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{E_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Initial energy of a node</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_033">
<alternatives><mml:math><mml:mi mathvariant="italic">E</mml:mi><mml:msub><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">t</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
E{(t)_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Energy consumed by the node</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_034">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">tx</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{n_{\mathrm{tx}}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_035">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">rx</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{n_{\mathrm{rx}}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Number of data packets transmitted and received by the node after time <italic>t</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><italic>α</italic> and <italic>β</italic></td>
<td style="vertical-align: top; text-align: left">Values in the open unit interval <inline-formula id="j_infor402_ineq_036">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
(0,1)$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_037">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">res</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{E_{\mathrm{res}}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Residual energy</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_038">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Weight factor for node <italic>i</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_039">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{x_{1}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor402_ineq_040">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{x_{2}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_041">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{x_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Weight values</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_042">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">Q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{Q_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Independent random variable</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_043">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_044">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Neighbour nodes</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_045">
<alternatives><mml:math><mml:mo stretchy="false">|</mml:mo><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">|</mml:mo><mml:mo stretchy="false">|</mml:mo></mml:math><tex-math><![CDATA[$
||{N_{i}}-{N_{j}}||$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Euclidean distance between the nodes locations</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_046">
<alternatives><mml:math><mml:mi mathvariant="italic">ϵ</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
\epsilon (y)$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Probability of a standard normal random variable</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>S</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Verifier</td>
</tr>
</tbody>
</table>
</table-wrap>
<def-list><def-item><term><bold>Degree difference</bold> <inline-formula id="j_infor402_ineq_048">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="normal">Δ</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">d</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
(\Delta {d_{i}})$]]></tex-math></alternatives></inline-formula><bold>:</bold></term><def>
<p>The degree difference metric <inline-formula id="j_infor402_ineq_049">
<alternatives><mml:math><mml:mi mathvariant="normal">Δ</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">d</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
\Delta {d_{i}}$]]></tex-math></alternatives></inline-formula> is the difference among the total size of the cluster and node degree. This metric provides an estimate of the number of residual number of nodes that can be managed by each node in the network. 
<disp-formula id="j_infor402_eq_001">
<label>(1)</label>
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="normal">Δ</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">d</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">ND</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:mi mathvariant="italic">z</mml:mi><mml:mo stretchy="false">|</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ \Delta {d_{i}}=|{\mathit{ND}_{i}}-z|,\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor402_ineq_050">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">ND</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mtext>node degree</mml:mtext><mml:mspace width="2.5pt"/></mml:math><tex-math><![CDATA[$
{\mathit{ND}_{i}}=\text{node degree}\hspace{2.5pt}$]]></tex-math></alternatives></inline-formula>, and <inline-formula id="j_infor402_ineq_051">
<alternatives><mml:math><mml:mi mathvariant="italic">z</mml:mi><mml:mo>=</mml:mo><mml:mtext>size of the cluster</mml:mtext><mml:mspace width="2.5pt"/></mml:math><tex-math><![CDATA[$
z=\text{size of the cluster}\hspace{2.5pt}$]]></tex-math></alternatives></inline-formula> (i.e. the number of nodes within the cluster).</p></def></def-item><def-item><term><bold>Node mobility</bold> <inline-formula id="j_infor402_ineq_052">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({m_{i}})$]]></tex-math></alternatives></inline-formula><bold>:</bold></term><def>
<p>This metric node mobility is based on the coordinates of the nodes, and is given by 
<disp-formula id="j_infor402_eq_002">
<label>(2)</label>
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mstyle><mml:msqrt><mml:mrow><mml:msup><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msup><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">v</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">v</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:msqrt><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ {m_{i}}=\frac{1}{{T_{2}}-{T_{1}}}\sqrt{{({u_{2}}-{u_{1}})^{2}}+{({v_{2}}-{v_{1}})^{2}}},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor402_ineq_053">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">v</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({u_{1}},{v_{1}})$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_054">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">u</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">v</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({u_{2}},{v_{2}})$]]></tex-math></alternatives></inline-formula> are the coordinates of the node at time <inline-formula id="j_infor402_ineq_055">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{T_{2}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_056">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">T</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{T_{1}}$]]></tex-math></alternatives></inline-formula>.</p></def></def-item><def-item><term><bold>Residual energy</bold> <inline-formula id="j_infor402_ineq_057">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">res</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({E_{\mathrm{res}}})$]]></tex-math></alternatives></inline-formula><bold>:</bold></term><def>
<p>The residual energy is computed based on the initial energy of a node <inline-formula id="j_infor402_ineq_058">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{E_{i}}$]]></tex-math></alternatives></inline-formula> and subtracting out the energy consumed by a node after a time period <italic>t</italic>. We let the energy consumed by a node <inline-formula id="j_infor402_ineq_059">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">E</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">t</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
(E(t))$]]></tex-math></alternatives></inline-formula>, and it is computed based on a formula that utilizes the number of data packets information transmitted and received: 
<disp-formula id="j_infor402_eq_003">
<label>(3)</label>
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">E</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">t</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">tx</mml:mi></mml:mrow></mml:msub><mml:mo>×</mml:mo><mml:mi mathvariant="italic">α</mml:mi><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">rx</mml:mi></mml:mrow></mml:msub><mml:mo>×</mml:mo><mml:mi mathvariant="italic">β</mml:mi><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ E(t)={n_{\mathrm{tx}}}\times \alpha +{n_{\mathrm{rx}}}\times \beta ,\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor402_ineq_060">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">tx</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{n_{\mathrm{tx}}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_061">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">rx</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{n_{\mathrm{rx}}}$]]></tex-math></alternatives></inline-formula> are the number of data packets transmitted and received by the node after time <italic>t</italic>, respectively. The parameters in the above formula <italic>α</italic> and <italic>β</italic> are in the open unit interval of values <inline-formula id="j_infor402_ineq_062">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
(0,1)$]]></tex-math></alternatives></inline-formula>. Then the residual energy <inline-formula id="j_infor402_ineq_063">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">res</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
({E_{\mathrm{res}}})$]]></tex-math></alternatives></inline-formula> for a node at time <italic>t</italic> is computed by, 
<disp-formula id="j_infor402_eq_004">
<label>(4)</label>
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">res</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:mi mathvariant="italic">E</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">t</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ {E_{\mathrm{res}}}={E_{i}}-E(t).\]]]></tex-math></alternatives>
</disp-formula>
</p></def></def-item><def-item><term><bold>Noise threshold:</bold></term><def>
<p>Let <inline-formula id="j_infor402_ineq_064">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">Q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{Q_{i}}$]]></tex-math></alternatives></inline-formula> be the independent random variable for the location estimation error. Let <inline-formula id="j_infor402_ineq_065">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\tau _{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_066">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">ψ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\psi _{i}^{2}}$]]></tex-math></alternatives></inline-formula> be the mean and variance of <inline-formula id="j_infor402_ineq_067">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">Q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{Q_{i}^{2}}$]]></tex-math></alternatives></inline-formula>. If the estimated location of <inline-formula id="j_infor402_ineq_068">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> is accurate, then probability distribution of <inline-formula id="j_infor402_ineq_069">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math><tex-math><![CDATA[$
{\tau ^{2}}$]]></tex-math></alternatives></inline-formula> for <inline-formula id="j_infor402_ineq_070">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>⩽</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau ^{2}}\leqslant {\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula> corresponds to: 
<disp-formula id="j_infor402_eq_005">
<label>(5)</label>
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:munder><mml:mrow><mml:mo movablelimits="false">lim</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:mo stretchy="false">→</mml:mo><mml:mi>∞</mml:mi></mml:mrow></mml:munder><mml:mi mathvariant="italic">F</mml:mi><mml:mo fence="true" maxsize="1.19em" minsize="1.19em">[</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>⩽</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo fence="true" maxsize="1.19em" minsize="1.19em">]</mml:mo><mml:mo>=</mml:mo><mml:mi mathvariant="italic">ε</mml:mi><mml:mo mathvariant="normal" fence="true" maxsize="2.03em" minsize="2.03em">(</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mi mathvariant="italic">n</mml:mi><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>−</mml:mo><mml:mi mathvariant="italic">ψ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">δ</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:mo mathvariant="normal" fence="true" maxsize="2.03em" minsize="2.03em">)</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ \underset{n\to \infty }{\lim }F\big[{\tau ^{2}}\leqslant {\tau _{0}^{2}}\big]=\varepsilon \bigg(\frac{n{\tau _{0}^{2}}-\psi }{\delta }\bigg),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor402_ineq_071">
<alternatives><mml:math><mml:mi mathvariant="italic">ψ</mml:mi><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mo largeop="false" movablelimits="false">∑</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msubsup><mml:msub><mml:mrow><mml:mi mathvariant="italic">ψ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
\psi ={\textstyle\sum _{i=1}^{n}}{\psi _{i}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor402_ineq_072">
<alternatives><mml:math><mml:mi mathvariant="italic">δ</mml:mi><mml:mo>=</mml:mo><mml:msqrt><mml:mrow><mml:msubsup><mml:mrow><mml:mo largeop="false" movablelimits="false">∑</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msubsup><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">δ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:mrow></mml:msqrt></mml:math><tex-math><![CDATA[$
\delta =\sqrt{{\textstyle\sum _{i=1}^{n}}{\delta _{i}^{2}}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_073">
<alternatives><mml:math><mml:mi mathvariant="italic">ε</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
\varepsilon (y)$]]></tex-math></alternatives></inline-formula> is the probability of a standard normal random variable being less than <italic>y</italic>. As <italic>ψ</italic> and <italic>δ</italic> are measured by ranging techniques, priority for the neighbour nodes <inline-formula id="j_infor402_ineq_074">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_075">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> is estimated. Then the probability <inline-formula id="j_infor402_ineq_076">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>⩽</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau ^{2}}\leqslant {\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula> for the benign node can be uniquely estimated using <inline-formula id="j_infor402_ineq_077">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula>. <inline-formula id="j_infor402_ineq_078">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula> should be estimated satisfying the following condition:</p>
<p>The cumulative distribution <inline-formula id="j_infor402_ineq_079">
<alternatives><mml:math><mml:mi mathvariant="italic">F</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>⩽</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math><tex-math><![CDATA[$
F[{\tau ^{2}}\leqslant {\tau _{0}^{2}}]$]]></tex-math></alternatives></inline-formula> should be closer to <inline-formula id="j_infor402_ineq_080">
<alternatives><mml:math><mml:mn>100</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
100\% $]]></tex-math></alternatives></inline-formula>. If a benign <inline-formula id="j_infor402_ineq_081">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> is cooperating well with <inline-formula id="j_infor402_ineq_082">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> in location estimation, then <inline-formula id="j_infor402_ineq_083">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo mathvariant="normal">&lt;</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau ^{2}}<{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula>, else <inline-formula id="j_infor402_ineq_084">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo mathvariant="normal">&gt;</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau ^{2}}>{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula>.</p></def></def-item></def-list> Note that <inline-formula id="j_infor402_ineq_085">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula> should be set accurately due to following reasons: If it is set too small, then the accurate estimated location would be considered inaccurate; otherwise, the inaccurate estimation would be considered accurate.</p>
<p>Next, we recall the main steps in a general clustering approach in the following steps:</p>
<list>
<list-item id="j_infor402_li_010">
<label>1.</label>
<p>Initially at the deployment of nodes in the network, a broadcast message of <italic>Hello</italic> is sent to its neighbours with the specific format of the message. Note that the <italic>Hello</italic> message consists of the following five parameters, namely node ID, node location (obtained using GPS), node degree difference (1), node mobility (2), and the residual energy (4).</p>
</list-item>
<list-item id="j_infor402_li_011">
<label>2.</label>
<p>The neighbours list (NL) is maintained by each using the original <italic>Hello</italic> message along with their self node ID. Each node now estimates a node factor using the above parameter values and unitary weight values <inline-formula id="j_infor402_ineq_086">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{x_{1}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor402_ineq_087">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{x_{2}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_088">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{x_{3}}$]]></tex-math></alternatives></inline-formula> with <inline-formula id="j_infor402_ineq_089">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$
{x_{1}}+{x_{2}}+{x_{3}}=1$]]></tex-math></alternatives></inline-formula>, 
<disp-formula id="j_infor402_eq_006">
<label>(6)</label>
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">μ</mml:mi><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>×</mml:mo><mml:mi mathvariant="normal">Δ</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">d</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>−</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>×</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>×</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">res</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ \mu =({x_{1}}\times \Delta {d_{i}})-({x_{2}}\times {m_{i}})+({x_{3}}\times {E_{\mathrm{res}}}).\]]]></tex-math></alternatives>
</disp-formula>
</p>
</list-item>
<list-item id="j_infor402_li_012">
<label>3.</label>
<p>After estimating the node factor, each node then forwards to its one-hop neighbours <inline-formula id="j_infor402_ineq_090">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">mes</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathrm{mes}}}$]]></tex-math></alternatives></inline-formula> value.</p>
<p><graphic xlink:href="infor402_g002.jpg"/></p>
</list-item>
<list-item id="j_infor402_li_013">
<label>4.</label>
<p>The highest value <inline-formula id="j_infor402_ineq_091">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">mes</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathrm{mes}}}$]]></tex-math></alternatives></inline-formula> based node is then selected as the cluster head (<inline-formula id="j_infor402_ineq_092">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula>). This selected node then transmits to its neighbourhood nodes a cluster head selection message (<inline-formula id="j_infor402_ineq_093">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula>_Select), see Fig. <xref rid="j_infor402_fig_001">1</xref>. This message contains the information about the node that is selected as <inline-formula id="j_infor402_ineq_094">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula> along with neighbourhood table values.</p>
</list-item>
<list-item id="j_infor402_li_014">
<label>5.</label>
<p>As a final step, after receiving the sent message <inline-formula id="j_infor402_ineq_095">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula>_Select from the cluster head <inline-formula id="j_infor402_ineq_096">
<alternatives><mml:math><mml:mi mathvariant="italic">CH</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CH}$]]></tex-math></alternatives></inline-formula>, a join reply <italic>J</italic>_Rep is sent from neighbourhood nodes in <inline-formula id="j_infor402_ineq_097">
<alternatives><mml:math><mml:mi mathvariant="italic">NL</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{NL}$]]></tex-math></alternatives></inline-formula> to <inline-formula id="j_infor402_ineq_098">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> for joining the cluster.</p>
</list-item>
</list>
</sec>
<sec id="j_infor402_s_009">
<label>3.3</label>
<title>Possible Attacks in a Location Based Routing Protocol</title>
<p>We next describe the possible attacks on location based routing protocol considered in this work. Our experimental simulation results in Section <xref rid="j_infor402_s_014">4.2</xref> provide the testing of results for the attacks described here. Generally, the attackers can be broadly classified as malicious and compromised nodes. A malicious node is not involved in accessing the message content. A compromised node behaves maliciously and can access the message content as it is trusted by other nodes in the network. A compromised node can launch several attacks effectively without being detected even by the strong cryptographic techniques. Both the malicious and compromised nodes can launch various attacks against the location aided routing protocols. Some of the common attacks are discussed in this section. Figure <xref rid="j_infor402_fig_002">2</xref> demonstrates the attacks on sensor nodes.</p>
<fig id="j_infor402_fig_002">
<label>Fig. 2.</label>
<caption>
<p>Possible attacks on sensor nodes in a MANET. Here we show attacks that can tamper the location information of true nodes thereby altering the actual position of a node.</p>
</caption>
<graphic xlink:href="infor402_g003.jpg"/>
</fig>
<def-list><def-item><term><bold>Location information tampering attacks.</bold></term><def>
<p>In this attack, the attackers are capable of modifying the content in location information packets. This attack includes impersonating other nodes and replaying packets with modified contents.</p></def></def-item><def-item><term><bold>Location falsifying attacks.</bold></term><def>
<p>The adversaries intentionally announce a fake position to gain the network access and can create the network traffic in high level.</p></def></def-item><def-item><term><bold>Location information dropping attack.</bold></term><def>
<p>In this attack, the adversaries intentionally drop some or all packets containing location information that are forwarded through it. It is known that MANET nodes act both as end hosts and routers. In this case, packet dropping attackers can destroy the entire functionality of the network with an increased number of attackers.</p></def></def-item><def-item><term><bold>Location table tampering attack.</bold></term><def>
<p>In this attack, the content stored in the location information table is modified by the attacker. This type of attack can include the deletion, modification, and falsification of contents that are provided in the location information table in a node-wise manner.</p></def></def-item><def-item><term><bold>Clogging.</bold></term><def>
<p>An attacker can initiate the neighbour position verification protocol several times over a short interval, and get the same challenge and reply message repeatedly from other nodes to congest or clog the communication medium. This adversarial action causes severe damage as the challenge messages are larger in size.</p></def></def-item><def-item><term><bold>Spoofing attack.</bold></term><def>
<p>The adversaries can spoof the packets that contain the location information.</p></def></def-item><def-item><term><bold>Jamming attack.</bold></term><def>
<p>The jamming adversaries block radio transmissions in a specified geographical region. Hence, the functioning of geographical routing protocol has to be prevented from using that area.</p></def></def-item></def-list>
</sec>
<sec id="j_infor402_s_010">
<label>3.4</label>
<title>Verification of Location Claims</title>
<p>In order to verify the location claims in the MANET, here we propose to use the direct symmetry test (DST) to securely verify the location claims of cluster members <inline-formula id="j_infor402_ineq_099">
<alternatives><mml:math><mml:mi mathvariant="italic">CM</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CM}$]]></tex-math></alternatives></inline-formula>. In the DST, each <inline-formula id="j_infor402_ineq_100">
<alternatives><mml:math><mml:mi mathvariant="italic">CM</mml:mi></mml:math><tex-math><![CDATA[$
\mathit{CM}$]]></tex-math></alternatives></inline-formula> of the cluster evaluates the communication neighbours with direct links. This means checking if the time of flight (ToF) distances are consistent with (i) one another, (ii) the location information propagated by the neighbourhood nodes, and (iii) a transmission range <italic>U</italic>. More specifically,</p>
<list>
<list-item id="j_infor402_li_015">
<label>1.</label>
<p>It not only verifies the distances <inline-formula id="j_infor402_ineq_101">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_102">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> obtained from transmission range, but also checks whether these distances do not differ by more than two times the ranging error along with a tolerance value.</p>
</list-item>
<list-item id="j_infor402_li_016">
<label>2.</label>
<p>It further checks for the consistency of the advertised neighbourhood node location information within a prescribed error margin level.</p>
</list-item>
<list-item id="j_infor402_li_017">
<label>3.</label>
<p>Finally, a sanity check whether <inline-formula id="j_infor402_ineq_103">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathit{CH}{N_{i}}}}$]]></tex-math></alternatives></inline-formula> is not greater than <italic>U</italic>.</p>
</list-item>
</list>
<p>We utilize the DST to securely verify the location claims of the user and a similar usage was done by Fiore <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_005">2013</xref>). Let <inline-formula id="j_infor402_ineq_104">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_105">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> be the two neighbour nodes within the cluster respectively, <inline-formula id="j_infor402_ineq_106">
<alternatives><mml:math><mml:mo stretchy="false">‖</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">‖</mml:mo></mml:math><tex-math><![CDATA[$
\| {N_{i}}-{N_{j}}\| $]]></tex-math></alternatives></inline-formula> be the Euclidean distance between the node locations, <italic>α</italic> be the tolerance value of the node mobility, <italic>β</italic> be the ranging error, and <italic>λ</italic> be the position error. Initially, in the DST based test, <inline-formula id="j_infor402_ineq_107">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CH}_{i}}$]]></tex-math></alternatives></inline-formula> performs the following:</p>
<list>
<list-item id="j_infor402_li_018">
<label>1.</label>
<p>It verifies the direct links with its neighbours within the transmission range, i.e. if 
<disp-formula id="j_infor402_eq_007">
<alternatives><mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo stretchy="false">|</mml:mo><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mn>2</mml:mn><mml:mi mathvariant="italic">α</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="italic">β</mml:mi><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math><tex-math><![CDATA[\[ |{\mu _{\mathit{CH}{N_{i}}}}-{\mu _{{N_{i}}{\mathit{CH}_{i}}}}|>2\alpha +\beta .\]]]></tex-math></alternatives>
</disp-formula> 
The above statement reveals that <inline-formula id="j_infor402_ineq_108">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CH}_{i}}$]]></tex-math></alternatives></inline-formula> verifies whether the distance <inline-formula id="j_infor402_ineq_109">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathit{CH}{N_{i}}}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_110">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{{N_{i}}{\mathit{CH}_{i}}}}$]]></tex-math></alternatives></inline-formula> measured through ranging is not more than twice the <italic>α</italic> value along with the <italic>β</italic> value.</p>
</list-item>
<list-item id="j_infor402_li_019">
<label>2.</label>
<p>It verifies whether, within an error margin, the position established by the neighbour is consistent with the obtained distances, i.e. <inline-formula id="j_infor402_ineq_111">
<alternatives><mml:math><mml:mo stretchy="false">‖</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">‖</mml:mo><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mn>2</mml:mn><mml:mi mathvariant="italic">λ</mml:mi><mml:mo>+</mml:mo><mml:mi mathvariant="italic">β</mml:mi></mml:math><tex-math><![CDATA[$
\| {\mathit{CH}_{i}}-{N_{i}}\| >2\lambda +\beta $]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_020">
<label>3.</label>
<p>It verifies whether <inline-formula id="j_infor402_ineq_112">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathit{CH}{N_{i}}}}$]]></tex-math></alternatives></inline-formula> is not greater than <italic>U</italic>, i.e. <inline-formula id="j_infor402_ineq_113">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mi mathvariant="italic">U</mml:mi></mml:math><tex-math><![CDATA[$
{\mu _{\mathit{CH}{N_{i}}}}>U$]]></tex-math></alternatives></inline-formula>.</p>
<p><graphic xlink:href="infor402_g004.jpg"/></p>
</list-item>
</list>
<p>Note that <italic>U</italic> refers to the maximum nominal transmission range, and it is greater than the distance at which two nodes can communicate. If there is a mismatch in the above three verification rules, then the neighbour node is marked as defective.</p>
</sec>
<sec id="j_infor402_s_011">
<label>3.5</label>
<title>Location Based Encryption Scheme</title>
<p>Once the location of the node is estimated, it is required to protect the location claim from eavesdropping and verify the consistency between the location <italic>Q</italic> and location claims <inline-formula id="j_infor402_ineq_114">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
QC$]]></tex-math></alternatives></inline-formula>. Let <inline-formula id="j_infor402_ineq_115">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula> be the noise threshold for the given estimated location, then we use the following scheme to check and protect.</p>
<list>
<list-item id="j_infor402_li_021">
<label>1.</label>
<p><inline-formula id="j_infor402_ineq_116">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CH}_{i}}$]]></tex-math></alternatives></inline-formula> estimates the <inline-formula id="j_infor402_ineq_117">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathit{CH}{N_{i}}}}$]]></tex-math></alternatives></inline-formula> of <inline-formula id="j_infor402_ineq_118">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> through ranging in Section <xref rid="j_infor402_s_008">3.2</xref>.</p>
</list-item>
<list-item id="j_infor402_li_022">
<label>2.</label>
<p>For <inline-formula id="j_infor402_ineq_119">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">CH</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mu _{\mathit{CH}{N_{i}}}}$]]></tex-math></alternatives></inline-formula></p>
<p><graphic xlink:href="infor402_g005.jpg"/></p>
</list-item>
</list>
<p>The noise threshold <inline-formula id="j_infor402_ineq_120">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula> is estimated in Section <xref rid="j_infor402_s_008">3.2</xref>.</p>
<p>
<list>
<list-item id="j_infor402_li_023">
<label>3.</label>
<p><inline-formula id="j_infor402_ineq_121">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> generates the <inline-formula id="j_infor402_ineq_122">
<alternatives><mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math><tex-math><![CDATA[$
n\times n$]]></tex-math></alternatives></inline-formula> key matrix <italic>M</italic> and transmits it to <inline-formula id="j_infor402_ineq_123">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> along with a group of geographical indexes <inline-formula id="j_infor402_ineq_124">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">X</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">Y</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
(X,Y)$]]></tex-math></alternatives></inline-formula>, where <italic>M</italic> holds the <inline-formula id="j_infor402_ineq_125">
<alternatives><mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math><tex-math><![CDATA[$
n\times n$]]></tex-math></alternatives></inline-formula> key for encryption and the indexes are used for mapping a key to a pair of geographical coordinates.</p>
</list-item>
<list-item id="j_infor402_li_024">
<label>4.</label>
<p><inline-formula id="j_infor402_ineq_126">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> finds a key <inline-formula id="j_infor402_ineq_127">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">g</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">h</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{g,h}}$]]></tex-math></alternatives></inline-formula> based on its location claim <inline-formula id="j_infor402_ineq_128">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
QC$]]></tex-math></alternatives></inline-formula> and encrypts <inline-formula id="j_infor402_ineq_129">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
QC$]]></tex-math></alternatives></inline-formula> using this key i.e. <inline-formula id="j_infor402_ineq_130">
<alternatives><mml:math><mml:mi mathvariant="italic">K</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">E</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">g</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">h</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$
K=E{m_{g,h}}(QC)$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_025">
<label>5.</label>
<p><inline-formula id="j_infor402_ineq_131">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> transmits the encrypted location <italic>K</italic> to <inline-formula id="j_infor402_ineq_132">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_026">
<label>6.</label>
<p>Once <inline-formula id="j_infor402_ineq_133">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> receives <italic>K</italic>, it decrypts the locations by tracking the key using the estimated location <italic>Q</italic>.</p>
<p>We illustrate this scheme with the following example.</p>
</list-item>
</list> 
<statement id="j_infor402_stat_001"><label>Example 1.</label>
<p>Consider the following scenario: <inline-formula id="j_infor402_ineq_134">
<alternatives><mml:math><mml:mi mathvariant="italic">τ</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math><tex-math><![CDATA[$
\tau =0$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor402_ineq_135">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
Q=QC$]]></tex-math></alternatives></inline-formula>. 
<list>
<list-item id="j_infor402_li_027">
<label>•</label>
<p>Here, <italic>Q</italic> and <inline-formula id="j_infor402_ineq_136">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
QC$]]></tex-math></alternatives></inline-formula> would be mapped to same key <inline-formula id="j_infor402_ineq_137">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">g</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">h</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{g,h}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_028">
<label>•</label>
<p>If <inline-formula id="j_infor402_ineq_138">
<alternatives><mml:math><mml:mi mathvariant="italic">τ</mml:mi><mml:mo stretchy="false">≠</mml:mo><mml:mn>0</mml:mn></mml:math><tex-math><![CDATA[$
\tau \ne 0$]]></tex-math></alternatives></inline-formula>, then <italic>Q</italic> may get deviated from <inline-formula id="j_infor402_ineq_139">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
QC$]]></tex-math></alternatives></inline-formula>. Here, the key <inline-formula id="j_infor402_ineq_140">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mi mathvariant="italic">g</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup><mml:mo mathvariant="normal">,</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="italic">h</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{{g^{\prime }},{h^{\prime }}}}$]]></tex-math></alternatives></inline-formula> found by <italic>Q</italic> will be different from <inline-formula id="j_infor402_ineq_141">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">g</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">h</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{g,h}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_029">
<label>•</label>
<p>Hence, a local search is performed around <inline-formula id="j_infor402_ineq_142">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mi mathvariant="italic">g</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup><mml:mo mathvariant="normal">,</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="italic">h</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{{g^{\prime }},{h^{\prime }}}}$]]></tex-math></alternatives></inline-formula> and search range is determined based on <inline-formula id="j_infor402_ineq_143">
<alternatives><mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math><tex-math><![CDATA[$
{\tau _{0}^{2}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_030">
<label>•</label>
<p>In particular, <inline-formula id="j_infor402_ineq_144">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> selects a <inline-formula id="j_infor402_ineq_145">
<alternatives><mml:math><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mstyle displaystyle="false"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfrac></mml:mstyle></mml:mrow></mml:mfenced><mml:mo>×</mml:mo><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mstyle displaystyle="false"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfrac></mml:mstyle></mml:mrow></mml:mfenced></mml:math><tex-math><![CDATA[$
\left(\frac{2{\tau _{0}}}{QC+1}\right)\times \left(\frac{2{\tau _{0}}}{QC+1}\right)$]]></tex-math></alternatives></inline-formula> sub-matrix and <inline-formula id="j_infor402_ineq_146">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup></mml:math><tex-math><![CDATA[$
{M^{\prime }}$]]></tex-math></alternatives></inline-formula> with <inline-formula id="j_infor402_ineq_147">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mi mathvariant="italic">g</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup><mml:mo mathvariant="normal">,</mml:mo><mml:msup><mml:mrow><mml:mi mathvariant="italic">h</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{{g^{\prime }},{h^{\prime }}}}$]]></tex-math></alternatives></inline-formula> as center.</p>
</list-item>
<list-item id="j_infor402_li_031">
<label>•</label>
<p>If <inline-formula id="j_infor402_ineq_148">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{0}}$]]></tex-math></alternatives></inline-formula>, a benign node, helps <inline-formula id="j_infor402_ineq_149">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> in estimating <italic>Q</italic> and offers an honest <inline-formula id="j_infor402_ineq_150">
<alternatives><mml:math><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi></mml:math><tex-math><![CDATA[$
QC$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor402_ineq_151">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">m</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">g</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">h</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{m_{g,h}}$]]></tex-math></alternatives></inline-formula> should be within <inline-formula id="j_infor402_ineq_152">
<alternatives><mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">M</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msup></mml:math><tex-math><![CDATA[$
{M^{\prime }}$]]></tex-math></alternatives></inline-formula>. That is, <inline-formula id="j_infor402_ineq_153">
<alternatives><mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">Q</mml:mi><mml:mo>−</mml:mo><mml:mi mathvariant="italic">Q</mml:mi><mml:mi mathvariant="italic">C</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal">&lt;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">τ</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
(Q-QC)<{\tau _{0}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor402_li_032">
<label>•</label>
<p>Then <inline-formula id="j_infor402_ineq_154">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> estimates through a local search.</p>
</list-item>
<list-item id="j_infor402_li_033">
<label>•</label>
<p>However, if <inline-formula id="j_infor402_ineq_155">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{j}}$]]></tex-math></alternatives></inline-formula> cannot find the correct key for decryption, then <inline-formula id="j_infor402_ineq_156">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{N_{i}}$]]></tex-math></alternatives></inline-formula> is considered to be malicious node.</p>
</list-item>
</list>
</p></statement></p>
</sec>
</sec>
<sec id="j_infor402_s_012">
<label>4</label>
<title>Performance Analysis</title>
<sec id="j_infor402_s_013">
<label>4.1</label>
<title>Experimental Setup and Performance Metrics</title>
<p>We used the network simulator NS-2 (Fall and Varadhan, <xref ref-type="bibr" rid="j_infor402_ref_004">2007</xref>) to test the performance of our proposed location verification technique for cluster based geographical routing (LVT-CBGR) and to perform comparisons. Table <xref rid="j_infor402_tab_002">2</xref> summarizes the simulation parameters used. Our simulation environment consists of the following key components: 
<list>
<list-item id="j_infor402_li_034">
<label>•</label>
<p>Routing, namely geographical routing (Muthusenthil and Murugavalli, <xref ref-type="bibr" rid="j_infor402_ref_011">2017</xref>) ;</p>
</list-item>
<list-item id="j_infor402_li_035">
<label>•</label>
<p>Node mobility and data traffic;</p>
</list-item>
<list-item id="j_infor402_li_036">
<label>•</label>
<p>Attacker model;</p>
</list-item>
<list-item id="j_infor402_li_037">
<label>•</label>
<p>DST based verification system.</p>
</list-item>
</list>
<table-wrap id="j_infor402_tab_002">
<label>Table 2</label>
<caption>
<p>Simulation parameters used in network simulator NS-2 for testing the performance of our proposed location verification technique for cluster based geographical routing (LVT-CBGR).</p>
</caption>
<table>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin">Number of nodes</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin">20 to 100</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Area size</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor402_ineq_157">
<alternatives><mml:math><mml:mn>1200</mml:mn><mml:mo>×</mml:mo><mml:mn>1200</mml:mn></mml:math><tex-math><![CDATA[$
1200\times 1200$]]></tex-math></alternatives></inline-formula> m</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MAC protocol</td>
<td style="vertical-align: top; text-align: left">802.11p</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">MAC data rate</td>
<td style="vertical-align: top; text-align: left">5 Mbps</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Simulation time</td>
<td style="vertical-align: top; text-align: left">600 s</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Traffic source</td>
<td style="vertical-align: top; text-align: left">CBR with 6 packets/s</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Channel type</td>
<td style="vertical-align: top; text-align: left">Wireless</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Packet Size</td>
<td style="vertical-align: top; text-align: left">512 bytes</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Packet type</td>
<td style="vertical-align: top; text-align: left">UDP</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Number of attackers</td>
<td style="vertical-align: top; text-align: left">10 to 30</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Tranmission range</td>
<td style="vertical-align: top; text-align: left">300 m</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Transmit power</td>
<td style="vertical-align: top; text-align: left">0.375 W</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Receiving power</td>
<td style="vertical-align: top; text-align: left">0.375 W</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Idle power</td>
<td style="vertical-align: top; text-align: left">0.1 W</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Initial energy</td>
<td style="vertical-align: top; text-align: left">7 J</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Antenna</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Omni</td>
</tr>
</tbody>
</table>
</table-wrap>
We used these components in the following specific settings for illustrative purposes. 
<def-list><def-item><term><bold>Geographical routing</bold></term><def>
<p>For our study, we utilized a greedy routing. This approach chooses the neighbour nearest to the destination as next hop for packets. In case of failure due to the unavailability of next hop, right hand thumb govern is applied, i.e. packets are put away locally until either an appropriate neighbour is reachable or until the packet drops due to overflow.</p></def></def-item><def-item><term><bold>Node mobility and data traffic scenario.</bold></term><def>
<p>The simulation mainly considered two parameters: data traffic and node mobility. As data traffic, 100 messages are transmitted from a <inline-formula id="j_infor402_ineq_158">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">S</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{S}}}$]]></tex-math></alternatives></inline-formula> source node to a <inline-formula id="j_infor402_ineq_159">
<alternatives><mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">CM</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:math><tex-math><![CDATA[$
{\mathit{CM}_{\mathrm{D}}}$]]></tex-math></alternatives></inline-formula> destination node. These messages are created between simulation time <inline-formula id="j_infor402_ineq_160">
<alternatives><mml:math><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math><tex-math><![CDATA[$
t=0$]]></tex-math></alternatives></inline-formula> s and <inline-formula id="j_infor402_ineq_161">
<alternatives><mml:math><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>30</mml:mn></mml:math><tex-math><![CDATA[$
t=30$]]></tex-math></alternatives></inline-formula> s.</p></def></def-item><def-item><term><bold>Attacker model.</bold></term><def>
<p>Attacker nodes are implemented based on these models.</p>
<p>• Whenever an attacker node uses random position field in its group and sends a beacon message to announce its present position instead of its actual position.</p>
<p>• Whenever a malicious node gets a data packet, falsifying the position of its own and rerouting packets, sometimes even being dropped to disconnect routes.</p>
</def></def-item><def-item><term><bold>Verification system.</bold></term><def>
<p>This based on the DST for all the nodes in the network.</p></def></def-item></def-list> The performance of LVT-CBGR is compared with a secure location verification protocol (SLVP) studied in Lo <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor402_ref_008">2013</xref>). To evaluate the performance of the models we utilized the following metrics of quality used widely in MANET settings.</p>
<def-list><def-item><term><bold>Average end-to-end delay.</bold></term><def>
<p>The end-to-end-delay is averaged over all surviving data packets from sources to the destinations.</p></def></def-item><def-item><term><bold>Average packet delivery ratio.</bold></term><def>
<p>It is the ratio of the number of packets received successfully and the total number of packets transmitted.</p></def></def-item><def-item><term><bold>Overhead.</bold></term><def>
<p>It is the number of packets dropped during the data transmission.</p></def></def-item><def-item><term><bold>Location error.</bold></term><def>
<p>It is the adversary nodes during one-hop transmission in packet forwarding.</p></def></def-item><def-item><term><bold>Throughput.</bold></term><def>
<p>It is the number of packets successfully delivered from source to destination per second with attacker’s false location claims.</p></def></def-item></def-list>
</sec>
<sec id="j_infor402_s_014">
<label>4.2</label>
<title>Results and Discussion</title>
<p>We next report the performance of the above metrics based on our simulation results with respect to varying the number of nodes as well as the number of attackers. 
<def-list><def-item><term><bold>Varying the number of nodes.</bold></term><def>
<p>We varied the total number nodes in the network from 20 to 100.</p></def></def-item></def-list> Figure <xref rid="j_infor402_fig_003">3</xref> shows the performance evaluation and comparison of the approach and the SLVP method with respect to the end-to-end delay. As the number of nodes goes up, the end-to-end delay is increased, which shows that the end-to-end delay of the proposed LVT-CBGR approach is smaller than that of the SLVP approach. It is established that the resilience of our LVT-CBGR method is around <inline-formula id="j_infor402_ineq_162">
<alternatives><mml:math><mml:mn>66</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
66\% $]]></tex-math></alternatives></inline-formula> smaller than the SLVP.</p>
<fig id="j_infor402_fig_003">
<label>Fig. 3.</label>
<caption>
<p>Node vs Delay (s). Comparison of our LVT-CBGR and SLVP performance in terms of end-to-end delay as the number of nodes increases indicating that the proposed network obtains lowest delay (s).</p>
</caption>
<graphic xlink:href="infor402_g006.jpg"/>
</fig>
<p>Figure <xref rid="j_infor402_fig_004">4</xref> illustrates the packet delivery ratio when there is an increase in the number of nodes. It is clear that our LVT-CBGR technique ushers in superior delivery ratio as against the SLVP approach. At the outset, when the rate is 20, the packet delivery ratio is <inline-formula id="j_infor402_ineq_163">
<alternatives><mml:math><mml:mn>30</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
30\% $]]></tex-math></alternatives></inline-formula> larger than the SLVP approach. But the packet delivery ratio is reduced as and when the rate is stepped up, which also illustrates that the packet delivery ratio and the rate are inversely proportional to each other. But in all scenarios, our novel LVT-CBGR method yields superlative delivery ratio than the SLVP technique.</p>
<fig id="j_infor402_fig_004">
<label>Fig. 4.</label>
<caption>
<p>Node vs Packet Delivery Ratio. Comparison of our LVT-CBGR and SLVP performance in terms of packet delivery ratio as the number of nodes increases shows that our proposed network obtains higher delivery ratios.</p>
</caption>
<graphic xlink:href="infor402_g007.jpg"/>
</fig>
<p>Figure <xref rid="j_infor402_fig_005">5</xref> effectively displays the packet drop ratio for the LVT-CBGR and the SLVP approach. In the case of the proposed technique, the packet drop is smaller than that of the modern approach by around a high <inline-formula id="j_infor402_ineq_164">
<alternatives><mml:math><mml:mn>70</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
70\% $]]></tex-math></alternatives></inline-formula>.</p>
<fig id="j_infor402_fig_005">
<label>Fig. 5.</label>
<caption>
<p>Node vs Packet Drop Ratio. Comparison of our LVT-CBGR and SLVP performance in terms of packet drop ratio (bytes) as the number of nodes increases. Our LVT-CBGR obtains a smaller packet drop even when the nodes increase to 100.</p>
</caption>
<graphic xlink:href="infor402_g008.jpg"/>
</fig>
<def-list><def-item><term><bold>Based on the number of attackers,</bold></term><def>
<p>we varied the total number of attackers from 10 to 30.</p></def></def-item></def-list>
<p>Figure <xref rid="j_infor402_fig_006">6</xref> illustrates the performance evaluation and comparison of the approach and the SLVP method with respect to the packet delivery ratio. As the number of attackers goes up, the packet delivery ratio is reduced, which shows that the attackers are capable of adversely affecting the efficiency in performance of the method. Still, the packet delivery ratio of the novel approach is larger than the modern approach. It is established that the resilience of our LVT-CBGR method is around 34% greater than the SLVP approach.</p>
<fig id="j_infor402_fig_006">
<label>Fig. 6.</label>
<caption>
<p>Attackers vs Packet Delivery Ratio. Comparison of our LVT-CBGR and SLVP performance in terms of packet delivery ratio as the number of attackers increases shows that our approach is more resilient to attacks.</p>
</caption>
<graphic xlink:href="infor402_g009.jpg"/>
</fig>
<p>Figure <xref rid="j_infor402_fig_007">7</xref> shows the performance evaluation and comparison of the approach and SLVP method with respect to compromised communication. As the number of attackers goes up, the compromised communication is increased, which shows that the attackers are capable of adversely affecting the efficiency in performance of the method. Still, the compromised communication of the approach is smaller than the SLVP approach. On analysis, it is established that the resilience of our LVT-CBGR method is around <inline-formula id="j_infor402_ineq_165">
<alternatives><mml:math><mml:mn>28</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
28\% $]]></tex-math></alternatives></inline-formula> smaller than the SLVP approach.</p>

<fig id="j_infor402_fig_007">
<label>Fig. 7.</label>
<caption>
<p>Attackers vs Compromised Communication. Comparison of our LVT-CBGR and SLVP performance in terms of communication fraction compromised as the number of attachers increases. Our LVT-CBGR compromises less communication as the number of attackers increase to 30.</p>
</caption>
<graphic xlink:href="infor402_g010.jpg"/>
</fig>

</sec>
</sec>
<sec id="j_infor402_s_015">
<label>5</label>
<title>Conclusion</title>
<p>In this paper, we have proposed to design a location verification technique for the cluster based geographical routing (LVT-CBGR) in mobile ad hoc networks (MANETs). In this technique, a direct symmetry test (DST) is used to securely verify the location claims. Then a location based encryption schema is employed to protect the estimated location against the eavesdropping attacks. By introducing a new noise threshold parameter in the CBGR formulation, the consistency between the location and location claims are verified effectively. With experimental simulations, we obtained good results with varying number of nodes, in particular our results on increasing the nodes against delay(s) showed that the LVT-CBGR obtained low delay times. Moreover, when compared to a related approach, the LVT-CBGR obtained increased packet delivery ratios of <inline-formula id="j_infor402_ineq_166">
<alternatives><mml:math><mml:mn>30</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
30\% $]]></tex-math></alternatives></inline-formula> higher, and packet drop ratio of less than <inline-formula id="j_infor402_ineq_167">
<alternatives><mml:math><mml:mn>70</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
70\% $]]></tex-math></alternatives></inline-formula>, indicating superior performance in information communication across. Further experimental results on security against varying number of attacks showed that our LVT-CBGR is resilient even when the number of attackers was the highest, as vindicated by a delivery ratio higher by <inline-formula id="j_infor402_ineq_168">
<alternatives><mml:math><mml:mn>34</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
34\% $]]></tex-math></alternatives></inline-formula>, and <inline-formula id="j_infor402_ineq_169">
<alternatives><mml:math><mml:mn>28</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math><tex-math><![CDATA[$
28\% $]]></tex-math></alternatives></inline-formula> less compromised communication.</p>
</sec>
</body>
<back>
<ack id="j_infor402_ack_001">
<title>Acknowledgements</title>
<p>The authors sincerely thank the reviewers for their comments that helped revise our manuscript and improve the overall content and presentation of the work.</p> </ack>
<ref-list id="j_infor402_reflist_001">
<title>References</title>
<ref id="j_infor402_ref_001">
<mixed-citation publication-type="journal"><string-name><surname>Adnan</surname>, <given-names>A.I.</given-names></string-name>, <string-name><surname>Hanapi</surname>, <given-names>Z.M.</given-names></string-name>, <string-name><surname>Othman</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Zukarnain</surname>, <given-names>Z.A.</given-names></string-name> (<year>2017</year>). <article-title>A secure region-based geographic routing protocol (SRBGR) for wireless sensor networks</article-title>. <source>PloS One</source>, <volume>12</volume>(<issue>1</issue>), <fpage>170</fpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_002">
<mixed-citation publication-type="journal"><string-name><surname>Basha</surname>, <given-names>S.A.</given-names></string-name>, <string-name><surname>Joshna</surname>, <given-names>G.P.</given-names></string-name> (<year>2014</year>). <article-title>Locating and verifying of neighbour positions in MANETs</article-title>. <source>International Journal of Computer and Electronics Research</source>, <volume>3</volume>(<issue>4</issue>), <fpage>220</fpage>–<lpage>222</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_003">
<mixed-citation publication-type="journal"><string-name><surname>El Defrawy</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Tsudik</surname>, <given-names>G.</given-names></string-name> (<year>2011</year>). <article-title>Privacy-preserving location-based on-demand routing in MANETs</article-title>. <source>IEEE Journal on Selected Areas in Communications</source>, <volume>29</volume>(<issue>10</issue>), <fpage>1926</fpage>–<lpage>1934</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_004">
<mixed-citation publication-type="other"><string-name><surname>Fall</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Varadhan</surname>, <given-names>K.</given-names></string-name> (2007). The network simulator (ns-2). <ext-link ext-link-type="uri" xlink:href="http://www.isi.edu/nsnam/ns">http://www.isi.edu/nsnam/ns</ext-link>. Retrieved 05 July 2019</mixed-citation>
</ref>
<ref id="j_infor402_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>Fiore</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Casetti</surname>, <given-names>C.E.</given-names></string-name>, <string-name><surname>Chiasserini</surname>, <given-names>C.F.</given-names></string-name>, <string-name><surname>Papadimitratos</surname>, <given-names>P.</given-names></string-name> (<year>2013</year>). <article-title>Discovery and verification of neighbor positions in mobile ad hoc networks</article-title>. <source>IEEE Transactions on Mobile Computing</source>, <volume>12</volume>(<issue>2</issue>), <fpage>289</fpage>–<lpage>303</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_006">
<mixed-citation publication-type="chapter"><string-name><surname>Lin</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Labiod</surname>, <given-names>H.</given-names></string-name> (<year>2006</year>). <chapter-title>INGEO: indoor geographic routing protocol for MANETs</chapter-title>. In: <source>Proceedings of the 3rd International Conference on Mobile Computing and Ubiquitous Networking</source>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_007">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>M.C.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>D.</given-names></string-name> (<year>2010</year>). <article-title>A node-to-node location verification method</article-title>. <source>IEEE Transactions on Industrial Electronics</source>, <volume>57</volume>(<issue>5</issue>), <fpage>1526</fpage>–<lpage>1537</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_008">
<mixed-citation publication-type="chapter"><string-name><surname>Lo</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>S.C.</given-names></string-name>, <string-name><surname>Kuo</surname>, <given-names>Y.H.</given-names></string-name> (<year>2013</year>). <chapter-title>Geographical forwarding scheme with location verification for vehicular ad hoc networks</chapter-title>. In: <source>21st International Conference on Software, Telecommunications and Computer Networks (SoftCOM)</source>, pp. <fpage>1</fpage>–<lpage>5</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Malandrino</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Borgiattino</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Casetti</surname>, <given-names>C.</given-names></string-name> (<year>2014</year>). <article-title>Verification and inference of positions in vehicular networks through anonymous beaconing</article-title>. <source>IEEE Transaction on Mobile Computing</source>, <volume>10</volume>, <fpage>2415</fpage>–<lpage>2428</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Muthusenthil</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Murugavalli</surname>, <given-names>S.</given-names></string-name> (<year>2014</year>). <article-title>Location aided cluster based geographical routing protocol for intermittently connected MANET</article-title>. <source>International Review on Computers and Software</source>, <volume>9</volume>(<issue>1</issue>), <fpage>1</fpage>–<lpage>9</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_011">
<mixed-citation publication-type="journal"><string-name><surname>Muthusenthil</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Murugavalli</surname>, <given-names>S.</given-names></string-name> (<year>2017</year>). <article-title>Privacy preservation and protection for cluster based geographic routing protocol in MANET</article-title>. <source>Wireless Networks</source>, <volume>23</volume>(<issue>1</issue>), <fpage>79</fpage>–<lpage>87</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_012">
<mixed-citation publication-type="other"><string-name><surname>Papadimitratos</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Poturalski</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Schaller</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Lafourcade</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Basin</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Capkun</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Hubaux</surname>, <given-names>J.P.</given-names></string-name> (<year>2008</year>). <article-title>Secure neighborhood discovery a fundamental element for mobile ad hoc networking</article-title>. <source>IEEE Communications Magazine</source>, <volume>46</volume>(<issue>2</issue>).</mixed-citation>
</ref>
<ref id="j_infor402_ref_013">
<mixed-citation publication-type="other"><string-name><surname>Rajakumar</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Amudhavel</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Dhavachelvan</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Vengattaraman</surname>, <given-names>T.</given-names></string-name> (2017). GWO-LPWSN: grey wolf optimization algorithm for node localization problem in wireless sensor network. <italic>Journal of Computer Networks and Communications</italic>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Rathidevi</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Kumaran</surname>, <given-names>N.S.</given-names></string-name> (<year>2015</year>). <article-title>Geographical routing in MANET using flexible combination of push and pull algorithm</article-title>. <source>International Journal of Science and Research</source>, <volume>2</volume>(<issue>3</issue>), <fpage>44</fpage>–<lpage>47</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Sheet</surname>, <given-names>D.K.</given-names></string-name>, <string-name><surname>Kaiwartya</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Abdullah</surname>, <given-names>A.H.</given-names></string-name>, <string-name><surname>Cao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Hassan</surname>, <given-names>A.N.</given-names></string-name>, <string-name><surname>Kumar</surname>, <given-names>S.</given-names></string-name> (<year>2017</year>). <article-title>Location information verification using transferable belief model for geographic routing in vehicular ad hoc networks</article-title>. <source>IET Intelligent Transport Systems</source>, <volume>11</volume>(<issue>2</issue>), <fpage>53</fpage>–<lpage>60</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_016">
<mixed-citation publication-type="journal"><string-name><surname>Shen</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Zhao</surname>, <given-names>L.</given-names></string-name> (<year>2013</year>). <article-title>ALERT: an anonymous location-based efficient routing protocol in MANETs</article-title>. <source>IEEE Transactions on Mobile Computing</source>, <volume>12</volume>(<issue>6</issue>), <fpage>1079</fpage>–<lpage>1093</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_017">
<mixed-citation publication-type="chapter"><string-name><surname>Xiang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>X.</given-names></string-name> (<year>2007</year>). <chapter-title>Self-adaptive on demand geographic routing protocols for mobile ad-hoc networks</chapter-title>. In: <source>26th IEEE International Conference on Computer Communications</source>, pp. <fpage>2296</fpage>–<lpage>2300</lpage>.</mixed-citation>
</ref>
<ref id="j_infor402_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Zou</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Chigan</surname>, <given-names>C.</given-names></string-name> (<year>2009</year>). <article-title>An anonymous on-demand source routing in MANETs</article-title>. <source>Security and Communication Networks</source>, <volume>2</volume>(<issue>6</issue>), <fpage>476</fpage>–<lpage>491</lpage>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>