2007
DOI: 10.1016/j.jpdc.2006.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Location verification and trust management for resilient geographic routing

Abstract: In this paper, we consider the security of geographic routing (GR) protocols. In GR, neighbors exchange their location information. Based on this information, a node forwards packets to the neighbor that is closest to the destination. Although GR is widely used in ad hoc and wireless sensor networks, its security has rarely been studied; there are a number of attacks that are possible on GR. In one attack, misbehaving nodes can falsify their location information. Also, malicious nodes can drop packets that the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(37 citation statements)
references
References 37 publications
0
37
0
Order By: Relevance
“…These studies, however, do not consider and respond to location-related attacks. Liu et al [33] consider the use of the location verification such that neighbors exchange their location information to address a series of locationrelated attacks. One main limitation of this scheme is that 4 Wireless Communications and Mobile Computing if the localization mechanism is separated from the routing protocol, the protocol will fail.…”
Section: Related Workmentioning
confidence: 99%
“…These studies, however, do not consider and respond to location-related attacks. Liu et al [33] consider the use of the location verification such that neighbors exchange their location information to address a series of locationrelated attacks. One main limitation of this scheme is that 4 Wireless Communications and Mobile Computing if the localization mechanism is separated from the routing protocol, the protocol will fail.…”
Section: Related Workmentioning
confidence: 99%
“…Generally, it is evaluated by values on a scale from zero to one. Several trust management protocols [6], [7] and [8] have been proposed for network security, data integrity, and secure routing in different fields. In [8] a group-based trust management scheme for clustered Wireless Sensor Networks was proposed.…”
Section: A Trust Protocolsmentioning
confidence: 99%
“…In the literature, trust has been used in WSNs for assessing the availability, reliability, or security property of a node (e.g., whether a node is malicious or not) based on past interaction experiences [6][7][8][9][10][11]. Ganeriwal et al [7] proposed a reputation-based framework for data integrity in WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…Also the analysis was conducted based on a flat WSN architecture which is not scalable. Liu et al [8] and Moraru et al [9] proposed trust management protocols and applied them to geographic routing in WSNs. However, no hierarchical trust management was considered for managing clustered WSNs.…”
Section: Related Workmentioning
confidence: 99%