Secure Geographical Routing Using an Efficient Location Verification Technique

  • S. L. Aruna RaoEmail author
  • K. V. N. Sunitha
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 8)


MANET is a dynamic network which is formed by autonomous system of mobile nodes which are autonomous in nature and are connected through links which are wireless and does not support a fixed infrastructure and hence are called infrastructure less networks. Since MANET has a mobile topology and it purely depends on intermediate nodes to relay messages, position of nodes keeps changing from time to time. During data transmission several nodes enter and leave the network. As a result, MANETs are vulnerable to several attacks in which the attackers get access to the network through malicious nodes entering the network in disguise of valid nodes. Hence, in MANETs it is necessary to verify the nodes before using them to forward data packets/messages. In this paper we estimate the position of the nodes before using them as forwarding nodes, and once it is verified for authenticity we then use them for transmitting data packets hence ensuring secure routing while transmission.


MANET SGRPVT SLVP Performance metrics 


  1. 1.
    Papadimitratos, Panos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, and J-P. Hubaux, “Secure neighborhood discovery: a fundamental element for mobile ad hoc networking”, Communications Magazine, IEEE 46, no. 2, pp. 132–139, 2008.Google Scholar
  2. 2.
    Shaik Arif Basha and G. Preethi Joshna, “Locating and Verifying of Neighbour Positions in MANETs”, International Journal of Computer and Electronics Research, vol. 3, Issue 4, August 2014.Google Scholar
  3. 3.
    Hsu, Chia-Chang, and Chin-Laung Lei, “A geographic scheme with location update for ad hoc routing”, Fourth International Conference on Systems and Networks Communications (ICSNC), pp. 43–48. IEEE, 2009.Google Scholar
  4. 4.
    El Defrawy, Karim, and Gene Tsudik “ALARM: anonymous location-aided routing in suspicious MANETs.” Mobile Computing, IEEE Transactions on 10, no. 9, pp. 1345–1358, 2011.Google Scholar
  5. 5.
    Lo, Chun-Chih, Shen-Chien Chen, and Yau-Hwang Kuo, “Geographical forwarding scheme with Location Verification for Vehicular ad hoc networks”, 21st International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–5. IEEE, 2013.Google Scholar
  6. 6.
    Dawei Liu, Moon-Chuen Lee, and Dan Wu, “A Node-to-Node Location Verification Method”, IEEE Transactions on Industrial Electronics, vol. 57, no. 5, MAY 2010.Google Scholar
  7. 7.
    Marco Fiore, Claudio Ettore Casetti, Carla-Fabiana Chiasserini and Panagiotis Papadimitratos, “Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 12, no. 2, Feb 2013.Google Scholar
  8. 8.
    Song, Joo-Han, Vincent WS Wong, and Victor Leung. “A framework of secure location service for position-based ad hoc routing”, In Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 99–106. ACM, 2004.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.BVRIT Hyderabad College of Engineering for WomenBachupally, HyderabadIndia

Personalised recommendations