Advertisement

Influence of Falsified Position Data on Geographic Ad-Hoc Routing

  • Tim Leinmüller
  • Elmar Schoch
  • Frank Kargl
  • Christian Maihöfer
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3813)

Abstract

There has been a lot of effort in the research on routing in mobile ad hoc networks in the last years. Promising applications of MANETs, e.g. in the automotive domain, are the drive for the design of inter-vehicle networks. So far, several projects in this field have chosen geographic routing approaches because of their outstanding performance and the possibility to support location-based applications like traffic warning functions. Having reached a reasonable functional level, a next step will be a deeper study of safety and security issues.

With this paper, we dive into that area by assuming defective or malicious nodes that disseminate wrong position data. First, we have a look at the local problems that may arise from falsified position data, then we show the global effects on the routing performance by simulating malicious nodes. Simulation results show that the overall ratio of successfully delivered messages decreases, depending on the number of maliciously acting nodes, even up to approximately 30%. We conclude from this result that future work should take these threats into account in order to design more robust routing protocols.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Franz, W., Wagner, C., Maihöfer, C., Hartenstein, H.: Fleetnet: Platform for inter-vehicle communications. In: Proc. 1st International Workshop on Intelligent Transportatin (WIT 2004), Hamburg, Germany (2004)Google Scholar
  2. 2.
  3. 3.
    US Vehicle Safety Communication Consortium, http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm
  4. 4.
  5. 5.
    Global Systems For Telematics, http://www.gstproject.org/
  6. 6.
    Mauve, M., Widmer, J., Hartenstein, H.: A survey on position-based routing in mobile ad-hoc networks (2001)Google Scholar
  7. 7.
    Kargl, F., Schlott, S., Weber, M., Klenk, A., Geiss, A.: Securing ad hoc routing protocols. In: Proceedings of 30th Euromicro Conference, Rennes, France (2004)Google Scholar
  8. 8.
    Kargl, F., Gei, A., Schlott, S., Weber, M.: Secure dynamic source routing. In: Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38), Hilton Waikoloa Village, HA (2005)Google Scholar
  9. 9.
    Hubaux, J.P., Čapkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy 4, 49–55 (2004)Google Scholar
  10. 10.
    Maihöfer, C., Eberhardt, R., Schoch, E.: CGGC: Cached Greedy Geocast. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 13–25. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Saha, A.K., Johnson, D.B.: Modeling mobility for vehicular ad-hoc networks. In: VANET 2004: Proceedings of the first ACM workshop on Vehicular ad hoc networks, pp. 91–92. ACM Press, New York (2004)CrossRefGoogle Scholar
  12. 12.
    Takagi, H., Kleinrock, L.: Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Transactions on Communications 32, 246–257 (1984)CrossRefGoogle Scholar
  13. 13.
    Hou, T.C., Li, V.: Transmission range control in multihop packet radio networks. IEEE Transactions on Communications 34, 38–44 (1986)CrossRefGoogle Scholar
  14. 14.
    Karp, B., Kung, H.: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the Sixth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, USA, pp. 243–254 (2000)Google Scholar
  15. 15.
    Ko, Y., Vaidya, N.: Location-aided routing (lar) in mobile ad hoc networks. In: Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1998), pp. 66–75 (1998)Google Scholar
  16. 16.
    Basagni, S., Chlamtac, I., Syrotiuk, V.R., Woodward, B.A.: A distance routing effect algorithm for mobility (DREAM). In: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Dallas, USA, pp. 76–84. ACM Press, New York (1998)CrossRefGoogle Scholar
  17. 17.
    Blazevic, L., Giordano, S., Boudec, J.L.: Self organized terminode routing. Technical Report DSC/2000/040, Swiss Federal Institute of Technology (2000)Google Scholar
  18. 18.
    Füssler, H., Mauve, M., Hartenstein, H., Käsemann, M., Vollmer, D.: A comparison of routing strategies for vehicular ad hoc networks. Technical Report TR-3-2002, Department of Computer Science, University of Mannheim (2002)Google Scholar
  19. 19.
    Kim, Y., Lee, J.J., Helmy, A.: Impact of location inconsistencies on geographic routing in wireless networks. In: MSWIM 2003: Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, pp. 124–127. ACM Press, New York (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Tim Leinmüller
    • 1
  • Elmar Schoch
    • 1
  • Frank Kargl
    • 2
  • Christian Maihöfer
    • 1
  1. 1.DaimlerChrysler AG, Research Vehicle IT and Services 
  2. 2.Department of Media InformaticsUniversity of Ulm 

Personalised recommendations