scispace - formally typeset
Search or ask a question
Topic

Geographic routing

About: Geographic routing is a research topic. Over the lifetime, 11687 publications have been published within this topic receiving 302224 citations.


Papers
More filters
Book
01 May 2003
TL;DR: This paper presents a meta-modelling framework for routing protocols in Ad-Hoc Wireless Networks and discusses future issues in Next Generation Wireless Networks.
Abstract: Acknowledgement. Preface. Part I: Cellular Networks - Introduction. Mobility Issues. Radio Resource Management. Location Management. Part II: Ad hoc Wireless Networks - Overview. Medium Access Control Techniques. Routing Protocols in Ad-Hoc Wireless Networks. Part III: Future Issues - Routing in Next Generation Wireless Networks. Conclusion. Index.

60 citations

Proceedings ArticleDOI
25 Jun 2012
TL;DR: This paper proposes a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs by using promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network.
Abstract: Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes.

60 citations

Proceedings ArticleDOI
19 Sep 2003
TL;DR: This paper introduces the novel idea of information-directed routing, in which routing is formulated as a joint optimization of data transport and information aggregation, and derives information constraints from realistic signal models, and presents several routing algorithms that find near-optimal solutions for the joint optimization problem.
Abstract: In a sensor network, data routing is tightly coupled to the needs of a sensing task, and hence the application semantics. This paper introduces the novel idea of information-directed routing, in which routing is formulated as a joint optimization of data transport and information aggregation. The routing objective is to minimize communication cost while maximizing information gain, differing from routing considerations for more general ad hoc networks. The paper uses the concrete problem of locating and tracking possibly moving signal sources as an example of information generation processes, and considers two common information extraction patterns in a sensor network: routing a user query from an arbitrary entry node to the vicinity of signal sources and back, or to a prespecified exit node, maximizing information accumulated along the path. We derive information constraints from realistic signal models, and present several routing algorithms that find near-optimal solutions for the joint optimization problem. Simulation results have demonstrated that information-directed routing is a significant improvement over a previously reported greedy algorithm, as measured by sensing quality such as localization and tracking accuracy and communication quality such as success rate in routing around sensor holes.

60 citations

Proceedings ArticleDOI
13 Oct 2005
TL;DR: This paper proposes approaches for route authentication and trust-based route selection to defeat attacks on the network and discusses the proposed approaches in detail, outlining possible attacks and defenses against them.
Abstract: In this paper, we consider the security of geographical forwarding (GF) -- a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their location information, and a node forwards packets to the destination by picking a neighbor that moves the packet closer to the destination. There are a number of attacks that are possible on geographic forwarding. One of the attacks is predicated on misbehaving nodes falsifying their location information. The first contribution of the paper is to propose a location verification algorithm that addresses this problem. The second contribution of the paper is to propose approaches for route authentication and trust-based route selection to defeat attacks on the network. We discuss the proposed approaches in detail, outlining possible attacks and defenses against them.

60 citations

Proceedings ArticleDOI
04 Jul 2012
TL;DR: This investigation introduces some existing Geocast routing protocols for VANETs and provides a classification of these protocols based on the used relay selection technique, and presents a comparison of these GeocAST routing protocols according to different criteria.
Abstract: In Vehicular Ad Hoc Networks VANETs, a multitude of applications need to address not a single vehicle on the road, nor the whole totality of vehicles, but only a community of vehicles which share the same geographic location for the purpose of safety, traffic efficiency, advertising or infotainment. The goal is to transmit data from a unique source node to a set of destination nodes satisfying a set of geographic criteria. Geocast routing protocol in VANETs appear to be the most appropriate routing technique for these applications. In this investigation, we introduce some existing Geocast routing protocols for VANETs and then we provide a classification of these protocols based on the used relay selection technique. We present a comparison of these Geocast routing protocols according to different criteria and finally, we highlight some directions we are considering for our Geocast routing solution for VANETs.

60 citations


Network Information
Related Topics (5)
Wireless ad hoc network
49K papers, 1.1M citations
95% related
Wireless sensor network
142K papers, 2.4M citations
94% related
Network packet
159.7K papers, 2.2M citations
94% related
Wireless network
122.5K papers, 2.1M citations
94% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
93% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202330
202286
202133
202037
201952
201890