Influence of Falsified Position Data on Geographic Ad-Hoc Routing
- 546 Downloads
There has been a lot of effort in the research on routing in mobile ad hoc networks in the last years. Promising applications of MANETs, e.g. in the automotive domain, are the drive for the design of inter-vehicle networks. So far, several projects in this field have chosen geographic routing approaches because of their outstanding performance and the possibility to support location-based applications like traffic warning functions. Having reached a reasonable functional level, a next step will be a deeper study of safety and security issues.
With this paper, we dive into that area by assuming defective or malicious nodes that disseminate wrong position data. First, we have a look at the local problems that may arise from falsified position data, then we show the global effects on the routing performance by simulating malicious nodes. Simulation results show that the overall ratio of successfully delivered messages decreases, depending on the number of maliciously acting nodes, even up to approximately 30%. We conclude from this result that future work should take these threats into account in order to design more robust routing protocols.
Unable to display preview. Download preview PDF.
- 1.Franz, W., Wagner, C., Maihöfer, C., Hartenstein, H.: Fleetnet: Platform for inter-vehicle communications. In: Proc. 1st International Workshop on Intelligent Transportatin (WIT 2004), Hamburg, Germany (2004)Google Scholar
- 2.CarTalk (2000), http://www.cartalk2000.net
- 3.US Vehicle Safety Communication Consortium, http://www-nrd.nhtsa.dot.gov/pdf/nrd-12/CAMP3/pages/VSCC.htm
- 4.Network on Wheels, http://www.informatik.uni-mannheim.de/pi4/lib/projects/NoW/links.html
- 5.Global Systems For Telematics, http://www.gstproject.org/
- 6.Mauve, M., Widmer, J., Hartenstein, H.: A survey on position-based routing in mobile ad-hoc networks (2001)Google Scholar
- 7.Kargl, F., Schlott, S., Weber, M., Klenk, A., Geiss, A.: Securing ad hoc routing protocols. In: Proceedings of 30th Euromicro Conference, Rennes, France (2004)Google Scholar
- 8.Kargl, F., Gei, A., Schlott, S., Weber, M.: Secure dynamic source routing. In: Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38), Hilton Waikoloa Village, HA (2005)Google Scholar
- 9.Hubaux, J.P., Čapkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security and Privacy 4, 49–55 (2004)Google Scholar
- 14.Karp, B., Kung, H.: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the Sixth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, USA, pp. 243–254 (2000)Google Scholar
- 15.Ko, Y., Vaidya, N.: Location-aided routing (lar) in mobile ad hoc networks. In: Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 1998), pp. 66–75 (1998)Google Scholar
- 17.Blazevic, L., Giordano, S., Boudec, J.L.: Self organized terminode routing. Technical Report DSC/2000/040, Swiss Federal Institute of Technology (2000)Google Scholar
- 18.Füssler, H., Mauve, M., Hartenstein, H., Käsemann, M., Vollmer, D.: A comparison of routing strategies for vehicular ad hoc networks. Technical Report TR-3-2002, Department of Computer Science, University of Mannheim (2002)Google Scholar
- 19.Kim, Y., Lee, J.J., Helmy, A.: Impact of location inconsistencies on geographic routing in wireless networks. In: MSWIM 2003: Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, pp. 124–127. ACM Press, New York (2003)CrossRefGoogle Scholar