STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
GPS-Free Positioning in Mobile ad-hoc Networks
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Geographic routing without location information
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Simulation analysis of virtual geographic routing
WSC '04 Proceedings of the 36th conference on Winter simulation
Organizing a global coordinate system from local information on an ad hoc sensor network
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
An application-driven perspective on wireless sensor network security
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Location verification and trust management for resilient geographic routing
Journal of Parallel and Distributed Computing
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Performance analysis of probabilistic multi-path geographic routing in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
An energy and trust-aware routing protocol for large wireless sensor networks
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
International Journal of Security and Networks
Energy-aware secure routing for large wireless sensor networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
A trust-based routing framework in energy-constrained wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
In this paper, we consider the security of geographical forwarding (GF) -- a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their location information, and a node forwards packets to the destination by picking a neighbor that moves the packet closer to the destination. There are a number of attacks that are possible on geographic forwarding. One of the attacks is predicated on misbehaving nodes falsifying their location information. The first contribution of the paper is to propose a location verification algorithm that addresses this problem. The second contribution of the paper is to propose approaches for route authentication and trust-based route selection to defeat attacks on the network. We discuss the proposed approaches in detail, outlining possible attacks and defenses against them.