2008
DOI: 10.1002/sec.56
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized position verification in geographic ad hoc routing

Abstract: SummaryInter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from node mobility and the demands of position-dependent applications. On the routing layer, those requirements are well met by geographic routing protocols. Functional research on geographic routing has already rea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
57
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(58 citation statements)
references
References 21 publications
1
57
0
Order By: Relevance
“…Schoch et al [6] describe the problem that arises from the incorrect position. They have proposed a framework that contains different detection mechanisms in order to avoid many problems caused due to fake positions.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…Schoch et al [6] describe the problem that arises from the incorrect position. They have proposed a framework that contains different detection mechanisms in order to avoid many problems caused due to fake positions.…”
Section: Related Workmentioning
confidence: 98%
“…Hubaux et al [11] has proposed the concept of smart vehicles and various equipments that are associated to every vehicle so that the concept of sensors discussed earlier [6] can be applied successfully.…”
Section: Related Workmentioning
confidence: 99%
“…In vehicular communication, the adversary node detection scheme needs to be capable of covering all the nodes present in the multi‐hop communication range. However, detection of false position claim using local sensors, as proposed in , has its own limitations in terms of sensing range that limits the vehicles' capabilities to achieve global security.…”
Section: Related Workmentioning
confidence: 99%
“…The secure protocol should be able to detect most of attacks against the routing process through mechanisms such as the following: Verification of position claim: almost all unicast routing protocols proposed for inter‐vehicular communication are position based . Hence, verifying the position is crucial to secure routing knowing that the forged position information has a severe impact on the performance and the security . Several location verification approaches developed in the literature can be used in our scheme. Verification of routing protocol execution: the adversarial nodes may attempt to compromise the network operation by exhibiting arbitrary (Byzantine) behavior .…”
Section: System Modelmentioning
confidence: 99%
“…Verification of position claim: almost all unicast routing protocols proposed for inter‐vehicular communication are position based . Hence, verifying the position is crucial to secure routing knowing that the forged position information has a severe impact on the performance and the security . Several location verification approaches developed in the literature can be used in our scheme.…”
Section: System Modelmentioning
confidence: 99%