Skip to main content
Article thumbnail
Location of Repository

Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks

By Wei Shi, Michel Barbeau and Joaquin Garcia-alfaro


Compass, face and geographical routing, for ad hoc and wireless sensor networks, rely on nodes knowing their geographic location and locations of other nodes. For location-unaware nodes without self-positiong devices (e.g., GPS), Garcia-Alfaro et al. proposed location determination algorithms leveraging location reports from neighbors. The evil ring is an attack on the location determination algorithms of Garcia-Alfaro et al. When inquired, an attacker returns a fake location sitting on a circle centered at the victim’s location and with radius equal to the attacker-victim separation distance. The calculation of the distance between the victim and attacker is not affected. A location-unaware node correctly determines its location. The attack, however, misleads into getting and using wrong locations of neighbors. We introduce and analyze an evil ring attack detection algorithm. Location-unaware nodes crosscheck consistency of information collected from neighbors. Neighbors perpetrating the evil rin

Year: 2011
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.