SlideShare a Scribd company logo
1 of 4
Download to read offline
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012



 Analysis of GPSR and its Relevant Attacks in Wireless
                 Sensor Networks
                   Suraj Sharma1, Sunil Kumar Panda2, Rahul Ramteke2 and Sanjay Kumar Jena2
                                       1
                                      National Institute of Technology Rourkela, Odisha
                                                 Email: suraj.atnitrkl@gmail.com
                                    2
                                      National Institute of Technology Rourkela, Odisha
                                  Email: {sunil.panda.nit, rahulatnit, skjenanitrkl}@gmail.com

Abstract— Most of the routing protocols proposed for ad-hoc              behavior for establishment of paths from source to destination
networks and sensor networks are not designed with security              routing protocols can be classified as proactive, reactive,
as a goal. Hence, many routing protocols are vulnerable to an            hybrid. Routing protocols can also be classified on the basis
attack by an adversary who can disrupt the network or harness            of network structure as Flat Network Routing, Hierarchical
valuable information from the network. Routing Protocols
                                                                         Network Routing and Location based routing [8].
for wireless sensor networks are classified into three types
depending on their network structure as Flat routing protocols,              The rest of the report is organized as follows. Section II
Hierarchical routing protocol and Geographic routing                     describes the Greedy perimeter stateless routing protocol
protocols. We mainly concentrate on location-based or                    (GPSR). Section III discusses the relevant attacks on GPSR.
geographic routing protocol like Greedy Perimeter Stateless              Section IV gives the implementation detail of GPSR and
Routing Protocol (GPSR). Sybil attack and Selective                      Selective, Sybil attack simulation over GPSR, followed by
forwarding attack are the two attacks feasible in GPSR. These            conclusion and lists the future work.
attacks are implemented in GPSR and their losses caused to
the network are analysed.                                                 II. GREEDY PERIMETER STATELESS ROUTING PROTOCOL (GPSR)
Index Terms—GPSR, Greedy, Perimeter, Selective forwarding                    Greedy Perimeter Stateless Routing (GPSR) [1] is a
attack, Sybil attack                                                     geographic or location based routing protocol that uses the
                                                                         geographic positions of routers and packets destination to
                        I. INTRODUCTION                                  make packet forwarding decision. Each node in a sensor
    Wireless Sensor Networks (WSN) is an interconnection                 network keeps track of the location of its immediate neighbors
of a large number of nodes deployed for monitoring the                   by using a simple beaconing algorithm. Periodically each node
environment or system by means of measurement of                         transmits a beacon to its immediate neighbors containing its
environmental parameters like temperature, pressure,                     own identifier and position [9]. In GPSR each node needs the
humidity. Sensor networks should also be adaptable to                    propagation of topology information for all those nodes
changing connectivity due to failure of node or introduction             which are single hop distance. Thus the state required is
of new nodes. Sensor nodes being highly energy constrained               minimum. As the name suggests GPSR routes the data
pose serious challenges to the maintenance of highly scalable            packets in greedy mode. Greedy forwarding is used
robust wireless network. The work is on thesis which is                  throughout the network whenever possible but in the regions
explored in this paper [10].                                             where greedy forwarding fails perimeter forwarding is used.

A. Routing Challenges                                                    A. Greedy Forwarding
Scalability: A large number of sensor nodes should be                        To forward a packet to its neighbor a source must know
deployed in sensing area and the routing scheme must be                  the geographic location of the destination. This information
able to work with these huge number of sensor nodes.                     can be obtained by a location server like GPS. A packet can
Fault tolerance: Failure of certain nodes will affect the overall        then be routed towards the destination in the greedy mode.
routing scheme. So formation of new links should be                      In a greedy mode a node selects the next node as that
accomplished.                                                            neighbor which is geographically closest to the destination.
Coverage: Wireless Sensor Networks must be deployed in a                 Thus GPSR [2] can save much amount of energy and can
large area to ensure more accuracy of the events occurring in            scale to large number of nodes in Wireless Sensor Network.
the environment.                                                         B. Perimeter Forwarding
Heterogeneity: Some sensor nodes differ in their technical                   There may be topology which requires a data packet to
design, data routing becomes little problem as sensing rate is           move temporarily away from the destination. When a node
different for different sensors.                                         encounters a void then it switches from greedy to perimeter
B. Classification of Routing Protocols                                   mode [3]. A node selects the next node according to the
Routing protocols [8] are responsible for routing data packets           righthand rule and the packet follows the path along the
from source node to the destination node. Depending on the               perimeter of the void towards the destination and the packet
                                                                         is said to enter into the perimeter mode [1].
© 2012 ACEEE                                                        20
DOI: 01.IJNS.03.01.116
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


C. Right Hand Rule                                                     B. Sybil Attack
    The right hand rule in graphs is used to route the packet              In a Sybil attack [4, 6] an adversary node presents multiple
whenever the packet encounters a void. Thus right hand rule            identities to other nodes in the network to use the services
says that when arriving at node x from node y, the next edge           offered by the network. In GPSR for wireless sensor network
traversed will be the next sequential counter-clockwise about          the nodes exchange their own and also their other neighbor’s
y the edge (x, y).                                                     location coordinates with their neighboring nodes by sending
                                                                       beacons at regular intervals. An adversary node in a network
D. Planarized graphs
                                                                       can initiate the Sybil attack by sending false location
    Planarized graphs are used to remove cross links in the            information.
network. A graph is said to be planar if no two edges cross.
The Relative Neighborhood Graph (RNG) and Gabriel Graph                C. Bogus Routing
(GG) [1] are two long known planar graphs. The RNG or GG                   This is the most common type of attack which can take
algorithm yields a network with no cross edges or crossing             place in Geographic Routing Protocol. Main motive of this
links.                                                                 attack is to modify or alter the routing information which is
Relative Neighborhood Graph (RNG):                                     commonly exchanged between two neighbor nodes. By
    The RNG can be defined as follows: An edge (u, v) will             spoofing the routing information adversaries becomes
exist between the vertices of u and v, if the distance between         capable of creating routing loops.
d (u, v) is always less than or equal to the distance between
the vertex w, and whichever among u and v is farther away                            IV. IMPLEMENTATION AND RESULTS
from v. In equation form [1]:
                                                                           We have developed and integrated GPSR routing protocol
                                                                       [7] into Qualnet5.0.2. We have also simulated Greedy Perimeter
                                                                       Stateless Routing Protocol (GPSR) [7] in QualNet5.0.2. Further
Gabriel Graph (GG):
                                                                       we have implemented Selective forwarding attack and Sybil
   Gabriel Graph [1] can be defined as follows: An edge (u,
                                                                       attack over GPSR to analyze the losses incurred by the
v) may exist between vertices u and v if no other vertex w is
                                                                       wireless sensor network. The results obtained from simulation
present within the circle whose diameter is uv. In equation
                                                                       of GPSR help us to measure the loss caused by the attacks.
form [1]:
                                                                       A. Implementation of GPSR
                                                                            A Wireless sensor network consisting of 17 nodes is used
   The full Greedy Perimeter Stateless Routing algorithm               for simulation. Node 15 acts a source or CBR client and Node
combines greedy forwarding on the full network graph with              9 acts as a destination or CBR server. All the nodes are set to
perimeter forwarding on the planarized network graph where             use GPSR as a routing protocol. An event has occurred near
greedy forwarding is not possible.                                     node 15 which acts as a source and the event has to be
                                                                       reported to node 9 which acts as a base station. To find the
     III. ATTACKS ON GEOGRAPHICAL ROUTING PROTOCOLS                    coordinates of neighboring nodes, each node sends beacons
                                                                       at regular intervals. A beacon packet consists of the location
    Greedy Perimeter Stateless Routing Protocol is robust and          of the node sending the beacon as well as their neighbor’s
efficient for the applications of Wireless Sensor Network but          location. The total number of beacon sent during simulation
it was not designed with security as a goal. The attacks in            by each node is 68. A node can receive beacons from more
sensor networks can be mainly distinguished as outsider                than one neighbor. Total number of beacons sent and received
attacks and the insider attacks [5]. In outsider attack the            during simulation is shown in Figure 1 for each node.
attacker has no special access to the sensor network whereas               Once the location of neighboring nodes is known packets
in an insider attack the attacker can access the sensor network        can be routed towards the destination in greedy mode. As
and model an attack by using compromised node to run                   shown in Figure 2, the number of greedy forwards by nodes
malicious code.                                                        3, 5, 14 and 15 are maximum as their respective neighbors are
A. Selective Forwarding Attack                                         closer to the destination. Conversely, as shown in Figure 3,
                                                                       nodes 9, 10, 14 have their respective neighbor’s farther from
    In a wireless sensor network some nodes may drop all the           the destination. Thus they have maximum perimeter forwards.
packets received for routing to the destination. A more subtle         Greedy forwards and perimeter forwards are the number of
form of attack is realized when an adversary does not drop all         packets forwarded by nodes in greedy and perimeter modes
the packets but selectively forwards few packets while                 respectively. As the packets are routed towards the
dropping all the other packets. Selective forwarding [4] can           destination they are switched from greedy mode to perimeter
cause no reporting or late reporting of an event in Wireless           mode when they encounter a void and switchback to the
Sensor Network. We have simulated selective forwarding                 greedy mode after covering the void several times until
attack on GPSR for wireless sensor network and measured                destination is reached. In the simulation the number of packet
the loss incurred by the network                                       dropped for each node is measured to be zero.

© 2012 ACEEE                                                      21
DOI: 01.IJNS.03.01. 116
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


                                                                          Similarly, selective forwarding attack does not much alter the
                                                                          greedy forwards and the perimeter forwards of the nodes.
                                                                          The smaller variation can be observed from Figure 5, 6 which
                                                                          is caused to cope the number of packets lost in the routing
                                                                          path. The number of greedy forwards for node 11 and node
                                                                          13 were 0 each in GPSR whereas in implementation of selective
                                                                          forwarding attack over GPSR it is found to be increased by 1
                                                                          each as shown in Figure 5.



       Figure.1. Total number of beacons sent and received.




                                                                              Figure.5. Number of greedy forwards in GPSR with Selective
                                                                                                  forwarding attack.
                                                                             The malicious nodes now drop most of the packets
                                                                          received and selectively forward the packet. As can be seen
                                                                          from Figure 7 the number of packet dropped for node 4 and
                                                                          node 10 is very high as compared to GPSR. Node 7 being a
                 Figure.2. GPSR greedy forwards.
                                                                          malicious node has zero number of packets dropped as
                                                                          packets are not routed through node 7. The loss of packets
                                                                          may lead to loss of an event being reported to the destination.




                                                                            Figure.6. Number of perimeter forwards in GPSR with Selective
               Figure 3. GPSR perimeter forwards.                                                forwarding attack.
B. Implementation of Selective forwarding attack over GPSR
    The example scenario of section III is used to implement
selective forwarding attack over GPSR. In our sample scenario
we have selected node 4, 7 and 10 as malicious nodes to
launch selective forwarding attack over GPSR. The selective
forwarding attack does not alter the number of beacons sent
and beacons received .Thus the total number of beacons
sent and beacons received remains same as in GPSR as
inferred from the Figure 4.                                                  Figure.7. Number of dropped packets in GPSR with Selective
                                                                                                 forwarding attack.

                                                                          C. Implementation of Sybil attack over GPSR
                                                                              The example scenario of section III is used to implement
                                                                          Sybil attack over GPSR. In our sample scenario we have
                                                                          selected node 1, 3 and 14 as malicious nodes to launch Sybil
                                                                          attack over GPSR. Sybil attack is launched by the malicious
                                                                          nodes by sending more number of beacons than the normal
                                                                          nodes to falsely advertise multiple locations. In our case each
                                                                          malicious node advertises four more false locations.Thus the
Figure.4. Beacon sent and Beacon received for Selective Forwarding        number of beacons sent for Sybil nodes are approximately
                             a tta ck
                                                                          four times the normal nodes as can be seen from Figure 8.
© 2012 ACEEE                                                         22
DOI: 01.IJNS.03.01.116
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


This results in increase in the number of beacons received                                        CONCLUSIONS
by other nodes and the number of fake identities in the
                                                                            GPSR was simulated for wireless sensor network and the
network.The Sybil attack alters the number of beacons sent
                                                                        packets were found to switch from greedy mode to perimeter
and beacons received .Thus the total changed number of
                                                                        mode to encounter a void in the routing path. Selective
beacons sent and beacons received leads to small variations
                                                                        forwarding attack was simulated over GPSR and it was found
in network in terms of greedy forwards, perimeter forwards
                                                                        that the packets dropped for malicious node has increased
etc. The smaller variation can be observed from Figure 9, 10
                                                                        as compared to that in GPSR.This may lead to an event being
which is caused to cope the changed number of beacons and
                                                                        unreported to base station. Sybil attack was implemented
advertisement of multiple locations of a Sybil node in the
                                                                        and it was found that malicious node advertising multiple
routing path. The number of greedy forwards for node 8 and
                                                                        geographic locations sends more number of beacons to their
node 13 were 1 and 0 respectively in GPSR whereas in
                                                                        neighbors’ as in comparison with GPSR, tends to alter the
implementation of Sybil attack over GPSR it is found to be
                                                                        routes of packets and wastage of network resources.
increased by 1 for node 13 and decreased by 1 for node 8
respectively as shown in Figure 9.                                                                 REFERENCES
                                                                        [1] Brad Karp and H. T. Kung, “GPSR: greedy perimeter stateless
                                                                        routing for wireless networks,” Proceedings of the 6th annual
                                                                        international conference on Mobile computing and networking New
                                                                        York, NY, USA, pp. 243–254, 2000.
                                                                        [2] D. Estrin, Y. Xu and J. Heidemann, “Geography-informed energy
                                                                        conservation for ad-hoc routing,” In Proceedings of the Seventh
                                                                        Annual ACM/IEEE International Conference on Mobile Computing
                                                                        and Networking, pp. 70–84, 2001.
                                                                        [3] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Worst-case optimal
 Figure.8. Beacon sent and Beacon received for Sybil attack over
                             GPSR.                                      and average-case efficient geometric ad-hoc routing,” In Proceedings
                                                                        of the 4th ACM International Conference on Mobile Computing and
                                                                        Networking, pp. 267–278, 2003.
                                                                        [4] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor
                                                                        Networks: Attacks and Countermeasures,” In First IEEE
                                                                        International Workshop on Sensor Network Protocols and
                                                                        Applications, pp. 113 –127, 2002.
                                                                        [5] Haowen Chan, A. Perrig and D. Song, “Random key
                                                                        predistribution schemes for sensor networks,” In Proceedings of
                                                                        the 2003 IEEE Symposium on Security and Privacy, pp. 197–213,
                                                                        May 2003.
                                                                        [6] J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil attack in
                                                                        sensor networks: analysis and defenses,” In Proceedings of the 3rd
      Figure.9. Greedy forwards for Sybil attack over GPSR.             international symposium on Information processing in sensor
                                                                        networks, pp. 259–268, April 2004.
                                                                        [7] Paolo Lutterotti, Giovanni Pau and UCLA, “GPSR: greedy
                                                                        perimeter stateless routing,” Contributed model for Vehicular
                                                                        Networks, June 2010.
                                                                        [8] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in
                                                                        wireless sensor networks: a survey,” IEEE Wireless
                                                                        Communications, vol. 11, pp. 6–28, December 2004.
                                                                        [9] Y. Yu, R. Govindan, and D. Estrin, “Geographical and energy
                                                                        aware routing: a recursive data dissemination protocol for wireless
                                                                        sensor networks,” Technical report, UCLA Computer Science
                                                                        Department, 2001.
    Figure.10. Perimeter forwards for Sybil attack over GPSR.           [10] S. K. Panda, R. Ramteke and S. K. Jena’ “Attacks on Geographic
                                                                        Routing Protocols for Wireless Sensor Network,” Thesis NIT
                                                                        Rourkela, Orissa, India, 2011.




© 2012 ACEEE                                                       23
DOI: 01.IJNS.03.01.116

More Related Content

What's hot

Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012Muhammad Farhan
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksambitlick
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
 
Indoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsIndoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsjoaquin_gonzalez
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkRamesh Patriotic
 

What's hot (18)

Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Article GSM
Article GSMArticle GSM
Article GSM
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networks
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
 
Indoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsIndoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNs
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Node detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor networkNode detection technique for node replication attack in mobile sensor network
Node detection technique for node replication attack in mobile sensor network
 

Viewers also liked

Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...IDES Editor
 
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...IDES Editor
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...IDES Editor
 
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemOptimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemIDES Editor
 
Conditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterConditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterIDES Editor
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsIDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Viewers also liked (8)

Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
 
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
 
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemOptimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
 
Conditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterConditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital Filter
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Similar to Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGr Patel
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET Journal
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5Alexander Decker
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 

Similar to Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks (20)

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor NetworkIRJET-Impact of Worm hole Attack in Wireless Sensor Network
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 
50120140503002
5012014050300250120140503002
50120140503002
 
Hybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor NetworksHybrid Target Tracking Scheme in Wireless Sensor Networks
Hybrid Target Tracking Scheme in Wireless Sensor Networks
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 

More from IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

More from IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks

  • 1. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks Suraj Sharma1, Sunil Kumar Panda2, Rahul Ramteke2 and Sanjay Kumar Jena2 1 National Institute of Technology Rourkela, Odisha Email: suraj.atnitrkl@gmail.com 2 National Institute of Technology Rourkela, Odisha Email: {sunil.panda.nit, rahulatnit, skjenanitrkl}@gmail.com Abstract— Most of the routing protocols proposed for ad-hoc behavior for establishment of paths from source to destination networks and sensor networks are not designed with security routing protocols can be classified as proactive, reactive, as a goal. Hence, many routing protocols are vulnerable to an hybrid. Routing protocols can also be classified on the basis attack by an adversary who can disrupt the network or harness of network structure as Flat Network Routing, Hierarchical valuable information from the network. Routing Protocols Network Routing and Location based routing [8]. for wireless sensor networks are classified into three types depending on their network structure as Flat routing protocols, The rest of the report is organized as follows. Section II Hierarchical routing protocol and Geographic routing describes the Greedy perimeter stateless routing protocol protocols. We mainly concentrate on location-based or (GPSR). Section III discusses the relevant attacks on GPSR. geographic routing protocol like Greedy Perimeter Stateless Section IV gives the implementation detail of GPSR and Routing Protocol (GPSR). Sybil attack and Selective Selective, Sybil attack simulation over GPSR, followed by forwarding attack are the two attacks feasible in GPSR. These conclusion and lists the future work. attacks are implemented in GPSR and their losses caused to the network are analysed. II. GREEDY PERIMETER STATELESS ROUTING PROTOCOL (GPSR) Index Terms—GPSR, Greedy, Perimeter, Selective forwarding Greedy Perimeter Stateless Routing (GPSR) [1] is a attack, Sybil attack geographic or location based routing protocol that uses the geographic positions of routers and packets destination to I. INTRODUCTION make packet forwarding decision. Each node in a sensor Wireless Sensor Networks (WSN) is an interconnection network keeps track of the location of its immediate neighbors of a large number of nodes deployed for monitoring the by using a simple beaconing algorithm. Periodically each node environment or system by means of measurement of transmits a beacon to its immediate neighbors containing its environmental parameters like temperature, pressure, own identifier and position [9]. In GPSR each node needs the humidity. Sensor networks should also be adaptable to propagation of topology information for all those nodes changing connectivity due to failure of node or introduction which are single hop distance. Thus the state required is of new nodes. Sensor nodes being highly energy constrained minimum. As the name suggests GPSR routes the data pose serious challenges to the maintenance of highly scalable packets in greedy mode. Greedy forwarding is used robust wireless network. The work is on thesis which is throughout the network whenever possible but in the regions explored in this paper [10]. where greedy forwarding fails perimeter forwarding is used. A. Routing Challenges A. Greedy Forwarding Scalability: A large number of sensor nodes should be To forward a packet to its neighbor a source must know deployed in sensing area and the routing scheme must be the geographic location of the destination. This information able to work with these huge number of sensor nodes. can be obtained by a location server like GPS. A packet can Fault tolerance: Failure of certain nodes will affect the overall then be routed towards the destination in the greedy mode. routing scheme. So formation of new links should be In a greedy mode a node selects the next node as that accomplished. neighbor which is geographically closest to the destination. Coverage: Wireless Sensor Networks must be deployed in a Thus GPSR [2] can save much amount of energy and can large area to ensure more accuracy of the events occurring in scale to large number of nodes in Wireless Sensor Network. the environment. B. Perimeter Forwarding Heterogeneity: Some sensor nodes differ in their technical There may be topology which requires a data packet to design, data routing becomes little problem as sensing rate is move temporarily away from the destination. When a node different for different sensors. encounters a void then it switches from greedy to perimeter B. Classification of Routing Protocols mode [3]. A node selects the next node according to the Routing protocols [8] are responsible for routing data packets righthand rule and the packet follows the path along the from source node to the destination node. Depending on the perimeter of the void towards the destination and the packet is said to enter into the perimeter mode [1]. © 2012 ACEEE 20 DOI: 01.IJNS.03.01.116
  • 2. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 C. Right Hand Rule B. Sybil Attack The right hand rule in graphs is used to route the packet In a Sybil attack [4, 6] an adversary node presents multiple whenever the packet encounters a void. Thus right hand rule identities to other nodes in the network to use the services says that when arriving at node x from node y, the next edge offered by the network. In GPSR for wireless sensor network traversed will be the next sequential counter-clockwise about the nodes exchange their own and also their other neighbor’s y the edge (x, y). location coordinates with their neighboring nodes by sending beacons at regular intervals. An adversary node in a network D. Planarized graphs can initiate the Sybil attack by sending false location Planarized graphs are used to remove cross links in the information. network. A graph is said to be planar if no two edges cross. The Relative Neighborhood Graph (RNG) and Gabriel Graph C. Bogus Routing (GG) [1] are two long known planar graphs. The RNG or GG This is the most common type of attack which can take algorithm yields a network with no cross edges or crossing place in Geographic Routing Protocol. Main motive of this links. attack is to modify or alter the routing information which is Relative Neighborhood Graph (RNG): commonly exchanged between two neighbor nodes. By The RNG can be defined as follows: An edge (u, v) will spoofing the routing information adversaries becomes exist between the vertices of u and v, if the distance between capable of creating routing loops. d (u, v) is always less than or equal to the distance between the vertex w, and whichever among u and v is farther away IV. IMPLEMENTATION AND RESULTS from v. In equation form [1]: We have developed and integrated GPSR routing protocol [7] into Qualnet5.0.2. We have also simulated Greedy Perimeter Stateless Routing Protocol (GPSR) [7] in QualNet5.0.2. Further Gabriel Graph (GG): we have implemented Selective forwarding attack and Sybil Gabriel Graph [1] can be defined as follows: An edge (u, attack over GPSR to analyze the losses incurred by the v) may exist between vertices u and v if no other vertex w is wireless sensor network. The results obtained from simulation present within the circle whose diameter is uv. In equation of GPSR help us to measure the loss caused by the attacks. form [1]: A. Implementation of GPSR A Wireless sensor network consisting of 17 nodes is used The full Greedy Perimeter Stateless Routing algorithm for simulation. Node 15 acts a source or CBR client and Node combines greedy forwarding on the full network graph with 9 acts as a destination or CBR server. All the nodes are set to perimeter forwarding on the planarized network graph where use GPSR as a routing protocol. An event has occurred near greedy forwarding is not possible. node 15 which acts as a source and the event has to be reported to node 9 which acts as a base station. To find the III. ATTACKS ON GEOGRAPHICAL ROUTING PROTOCOLS coordinates of neighboring nodes, each node sends beacons at regular intervals. A beacon packet consists of the location Greedy Perimeter Stateless Routing Protocol is robust and of the node sending the beacon as well as their neighbor’s efficient for the applications of Wireless Sensor Network but location. The total number of beacon sent during simulation it was not designed with security as a goal. The attacks in by each node is 68. A node can receive beacons from more sensor networks can be mainly distinguished as outsider than one neighbor. Total number of beacons sent and received attacks and the insider attacks [5]. In outsider attack the during simulation is shown in Figure 1 for each node. attacker has no special access to the sensor network whereas Once the location of neighboring nodes is known packets in an insider attack the attacker can access the sensor network can be routed towards the destination in greedy mode. As and model an attack by using compromised node to run shown in Figure 2, the number of greedy forwards by nodes malicious code. 3, 5, 14 and 15 are maximum as their respective neighbors are A. Selective Forwarding Attack closer to the destination. Conversely, as shown in Figure 3, nodes 9, 10, 14 have their respective neighbor’s farther from In a wireless sensor network some nodes may drop all the the destination. Thus they have maximum perimeter forwards. packets received for routing to the destination. A more subtle Greedy forwards and perimeter forwards are the number of form of attack is realized when an adversary does not drop all packets forwarded by nodes in greedy and perimeter modes the packets but selectively forwards few packets while respectively. As the packets are routed towards the dropping all the other packets. Selective forwarding [4] can destination they are switched from greedy mode to perimeter cause no reporting or late reporting of an event in Wireless mode when they encounter a void and switchback to the Sensor Network. We have simulated selective forwarding greedy mode after covering the void several times until attack on GPSR for wireless sensor network and measured destination is reached. In the simulation the number of packet the loss incurred by the network dropped for each node is measured to be zero. © 2012 ACEEE 21 DOI: 01.IJNS.03.01. 116
  • 3. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 Similarly, selective forwarding attack does not much alter the greedy forwards and the perimeter forwards of the nodes. The smaller variation can be observed from Figure 5, 6 which is caused to cope the number of packets lost in the routing path. The number of greedy forwards for node 11 and node 13 were 0 each in GPSR whereas in implementation of selective forwarding attack over GPSR it is found to be increased by 1 each as shown in Figure 5. Figure.1. Total number of beacons sent and received. Figure.5. Number of greedy forwards in GPSR with Selective forwarding attack. The malicious nodes now drop most of the packets received and selectively forward the packet. As can be seen from Figure 7 the number of packet dropped for node 4 and node 10 is very high as compared to GPSR. Node 7 being a Figure.2. GPSR greedy forwards. malicious node has zero number of packets dropped as packets are not routed through node 7. The loss of packets may lead to loss of an event being reported to the destination. Figure.6. Number of perimeter forwards in GPSR with Selective Figure 3. GPSR perimeter forwards. forwarding attack. B. Implementation of Selective forwarding attack over GPSR The example scenario of section III is used to implement selective forwarding attack over GPSR. In our sample scenario we have selected node 4, 7 and 10 as malicious nodes to launch selective forwarding attack over GPSR. The selective forwarding attack does not alter the number of beacons sent and beacons received .Thus the total number of beacons sent and beacons received remains same as in GPSR as inferred from the Figure 4. Figure.7. Number of dropped packets in GPSR with Selective forwarding attack. C. Implementation of Sybil attack over GPSR The example scenario of section III is used to implement Sybil attack over GPSR. In our sample scenario we have selected node 1, 3 and 14 as malicious nodes to launch Sybil attack over GPSR. Sybil attack is launched by the malicious nodes by sending more number of beacons than the normal nodes to falsely advertise multiple locations. In our case each malicious node advertises four more false locations.Thus the Figure.4. Beacon sent and Beacon received for Selective Forwarding number of beacons sent for Sybil nodes are approximately a tta ck four times the normal nodes as can be seen from Figure 8. © 2012 ACEEE 22 DOI: 01.IJNS.03.01.116
  • 4. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 This results in increase in the number of beacons received CONCLUSIONS by other nodes and the number of fake identities in the GPSR was simulated for wireless sensor network and the network.The Sybil attack alters the number of beacons sent packets were found to switch from greedy mode to perimeter and beacons received .Thus the total changed number of mode to encounter a void in the routing path. Selective beacons sent and beacons received leads to small variations forwarding attack was simulated over GPSR and it was found in network in terms of greedy forwards, perimeter forwards that the packets dropped for malicious node has increased etc. The smaller variation can be observed from Figure 9, 10 as compared to that in GPSR.This may lead to an event being which is caused to cope the changed number of beacons and unreported to base station. Sybil attack was implemented advertisement of multiple locations of a Sybil node in the and it was found that malicious node advertising multiple routing path. The number of greedy forwards for node 8 and geographic locations sends more number of beacons to their node 13 were 1 and 0 respectively in GPSR whereas in neighbors’ as in comparison with GPSR, tends to alter the implementation of Sybil attack over GPSR it is found to be routes of packets and wastage of network resources. increased by 1 for node 13 and decreased by 1 for node 8 respectively as shown in Figure 9. REFERENCES [1] Brad Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” Proceedings of the 6th annual international conference on Mobile computing and networking New York, NY, USA, pp. 243–254, 2000. [2] D. Estrin, Y. Xu and J. Heidemann, “Geography-informed energy conservation for ad-hoc routing,” In Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 70–84, 2001. [3] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Worst-case optimal Figure.8. Beacon sent and Beacon received for Sybil attack over GPSR. and average-case efficient geometric ad-hoc routing,” In Proceedings of the 4th ACM International Conference on Mobile Computing and Networking, pp. 267–278, 2003. [4] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” In First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113 –127, 2002. [5] Haowen Chan, A. Perrig and D. Song, “Random key predistribution schemes for sensor networks,” In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213, May 2003. [6] J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil attack in sensor networks: analysis and defenses,” In Proceedings of the 3rd Figure.9. Greedy forwards for Sybil attack over GPSR. international symposium on Information processing in sensor networks, pp. 259–268, April 2004. [7] Paolo Lutterotti, Giovanni Pau and UCLA, “GPSR: greedy perimeter stateless routing,” Contributed model for Vehicular Networks, June 2010. [8] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, vol. 11, pp. 6–28, December 2004. [9] Y. Yu, R. Govindan, and D. Estrin, “Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks,” Technical report, UCLA Computer Science Department, 2001. Figure.10. Perimeter forwards for Sybil attack over GPSR. [10] S. K. Panda, R. Ramteke and S. K. Jena’ “Attacks on Geographic Routing Protocols for Wireless Sensor Network,” Thesis NIT Rourkela, Orissa, India, 2011. © 2012 ACEEE 23 DOI: 01.IJNS.03.01.116