DocumentCode :
3039689
Title :
Secure geographic routing protocol in MANETs
Author :
Vineela, A. ; Rao, K. Venkateswara
Author_Institution :
Dept. of Comput. Sci., G.PullaReddy Eng. Coll., Kurnool, India
fYear :
2011
fDate :
23-24 March 2011
Firstpage :
1063
Lastpage :
1069
Abstract :
GEOGRAPHIC routing protocols use a basic geographic forwarding strategy to forward packets node by nodes toward the location of the destination. This approach to routing has the advantage of eliminating the need for nodes to maintain conventional routing information. One geographic routing protocol named Boundary State Routing protocol which routes the data using the location of nodes. In this paper we discussed possible attacks in boundary state routing protocol namely wormhole attacks and proposed two methods to avoid wormhole attacks namely Counter March Technique (CMT) and Signature Based Verification Technique (SBVT). The CMT method uses no methodology for the detection of the malicious nature of the intermediate nodes. SBVT method uses cryptographic concepts.
Keywords :
cryptographic protocols; mobile ad hoc networks; routing protocols; telecommunication security; MANET; boundary state routing protocol; counter march technique; cryptographic concepts; geographic forwarding strategy; routing information; secure geographic routing protocol; signature based verification technique; Ad hoc networks; Compass; Digital signatures; Network topology; Routing; Routing protocols; Topology; Geographic Routing; Mobile ad hoc Networks; Security; Wormhole attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference on
Conference_Location :
Tamil Nadu
Print_ISBN :
978-1-4244-7923-8
Type :
conf
DOI :
10.1109/ICETECT.2011.5760276
Filename :
5760276
Link To Document :
بازگشت