The Impact of Location Based Attacks on Geographical Routing Protocols

نویسندگان

  • B. MUTHUSENTHIL
  • S. MURUGAVALLI
چکیده

Several applications of mobile ad hoc networks select geographical routing especially the Greedy Perimeter Stateless Routing (GPSR) protocol due to its scalability, efficiency, and ability to support location based applications. However, there are many security issues in protecting location information, which can easily be abused by attackers. Location based adversarial activities affect the operation and performance of geographical routing protocols. There are only a few works on the literature that studied the impact of location based attacks on geographical routing. This work analyzes the impact of malicious nodes on the GPSR performance associated with fake location. This proposal identifies a set of possible location based attacks and analyzes the local problems that arise from the location based adversarial activities. Finally, it demonstrates the overall impact on the routing performance, by simulating the network in various attack scenarios. This study illustrates the effect of the adversarial activities with respect to the packet delivery ratio, overhead, average end-to-end delay, routing loops, packet dropping probability, and location error rate. The simulation results concluded that the overall routing performance degrades, depending on the type and percentage of adversaries.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

A Prediction Scheme to Enhance the Routing Process in Geographical GSPR Ad Hoc Protocol

Geographical routing protocols have been received serious attention due to their advantages as compared to conventional routing protocols. They require information about the physical position of nodes to be available. Commonly, each node determines its own position through the use of Global Positioning System (GPS) or some other type of positioning service. Greedy Perimeter Stateless Routing (G...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014