Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

By using the dRS and φRS, VR calculates its location and

compares it with the sensor dataR to see if VS actually exists


at the location where VS claims to be. If VS does not exist
at the location in sensor dataR, then location spoofing is
detected. The process of source verification is illustrated in the
line 6-11 in Algorithm 1. Once the source location is verified,
the location of the receiver also needs to be confirmed in
the source’s sensor data sensor dataS. Similarly, the distance
dSR and the angle φSR of VR from VS are computed and the
location of VR is confirmed in sensor dataS. If the receiver is
not found in sensor dataS, then there exists possible location
spoofing. The recipient verification process is illustrated in the
line 13-18.

You might also like