p from producing erroneous information. The protocol can

Published by admin on

p { margin-bottom: 0.1in; direction: ltr; line-height: 120%; text-align: left; }p.western { font-family: “Times New Roman”,serif; font-size: 12pt; }p.cjk { font-family: “Times New Roman”; font-size: 12pt; }p.ctl { font-family: “Times New Roman”; font-size: 12pt; }a:link { color: rgb(0, 0, 255); }

K. & Jaganraj (2013)
proposed new approach in position verification of neighbour in ad-hoc
network by integrating the Neighbour Position Verification protocol
with spontaneous ad-hoc network protocol in which node in the
network verify the position of its neighbours as well as performing
security analysis of the system. Again, However, Zeng, Jiannong, Jue,
& Li (2013)
presented sensors locations to secure
localisation and location verification of node by preventing an
adversary from producing erroneous information. The protocol can
detect and revoke the nodes producing erroneous information and
filter the received erroneous information. Hence, the approach has
limitation of addressing threats in the localisation
process to make the estimated locations wrong. Secondly, since sensor
nodes can be compromise, the base station may not trust the locations
reported by sensor nodes. In
related problem of
position verification, G.J.Archanaa & R. (2014) have addressed
similar problems addressed by (Abumansoor & Azzedine , 2012).
The scheme was base on MultiHop
Location Verification Protocol (MHLVP);
it helps vehicles to verify their neighbor’s location when direct
communications between verifier and claimer were not feasible due to
NLOS. Thus, some
drawbacks where observed. Firstly, the evaluation of the scheme
highlighted softness of the schemes to attacks like packet drop.
Secondly, the protocol uses assertions
that, there is one shared neighbour with direct link between the
requester and questioned vehicle. Thus, the
request information
sent by a vehicle
to another can be attack by injecting false information from an
outsider or insider attack from malicious node, this type of attack
can affects the privacy and integrity of vehicle’s location

Categories: Communications


I'm Iren!

Would you like to get a custom essay? How about receiving a customized one?

Check it out