Skip to Main Content
Wormhole attacks in networks consist in two malicious nodes tunneling traffic from one end of the network to the other. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. In this paper we present the possible attacks on BSR protocol. These attacks are difficult to be detected. To avoid the attacks on BSR protocol, we propose two schemes namely Reverse Routing Scheme (RRS) and Authentication of Nodes Scheme (ANS). The RRS method uses no methodology for the detection of the malicious nature of the intermediate nodes. ANS method uses cryptographic concepts.