Mobility

Cross Verification-Based Detection of the Evil Ring Attack in Wireless Sensor Networks

Free registration required

Executive Summary

In ad hoc networks and wireless sensor networks, several routing algorithms rely on the knowledge by the network nodes of their own geographic location and those of others. For cases where a node doesn't have its own positioning device (e.g., GPS), Alfaro et al. propose several algorithms that a node can run to determine its geographic position using position reports from neighbors. In this paper, the authors first present the evil ring attack, an attack on the geographic location algorithms of Alfaro et al. that misleads nodes about the true position of their neighbors.

  • Format: PDF
  • Size: 868.88 KB