Title :
Secure geographic routing protocol in MANETs
Author :
Vineela, A. ; Rao, K. Venkateswara
Author_Institution :
Dept. of Comput. Sci., G.PullaReddy Eng. Coll., Kurnool, India
Abstract :
GEOGRAPHIC routing protocols use a basic geographic forwarding strategy to forward packets node by nodes toward the location of the destination. This approach to routing has the advantage of eliminating the need for nodes to maintain conventional routing information. One geographic routing protocol named Boundary State Routing protocol which routes the data using the location of nodes. In this paper we discussed possible attacks in boundary state routing protocol namely wormhole attacks and proposed two methods to avoid wormhole attacks namely Counter March Technique (CMT) and Signature Based Verification Technique (SBVT). The CMT method uses no methodology for the detection of the malicious nature of the intermediate nodes. SBVT method uses cryptographic concepts.
Keywords :
cryptographic protocols; mobile ad hoc networks; routing protocols; telecommunication security; MANET; boundary state routing protocol; counter march technique; cryptographic concepts; geographic forwarding strategy; routing information; secure geographic routing protocol; signature based verification technique; Ad hoc networks; Compass; Digital signatures; Network topology; Routing; Routing protocols; Topology; Geographic Routing; Mobile ad hoc Networks; Security; Wormhole attacks;
Conference_Titel :
Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on
Conference_Location :
Tamil Nadu
Print_ISBN :
978-1-4244-7923-8
DOI :
10.1109/ICETECT.2011.5760276