Simulation Code for Virtual Coordinate System Attacks and Defense
This code contains the attacks and defense techniques presented in  on Beacon Vector Routing .
This code is implemented as part of the tinyos-1.x distribution. The easiest way to get started on the code is to download and install tinyos-1.x. In particular, make sure that the bvr protocol in the directory contrib/bvr works correctly. Then replace that directory with the code here.
|Attacks and Defense Implemented|
The code implemented coordinate deflation, inflation, oscillation, and hash chain replay attacks, as well as hash chain replay defense and oscillation defense techniques. In addition, the code also outputs the coordinates of nodes when the network stablizes, route success ratio and average path length under various attack and defense scenarios. For full description of the attacks, defense techniques and the metrics output by the code, please refer to our paper .
 Dong, J., Ackermann, K. E., Bavar, B., and Nita-Rotaru, C. Mitigating attacks against virtual coordinate based routing in wireless sensor networks. In Proceedings of the First ACM Conference on Wireless Network Security Alexandria, VA, USA
 R. Fonseca, S. Ratnasamy, J. Zhao, C. T. Ee, D. Culler, S. Shenker, and I.
Stoica. Beacon vector routing: Scalable point-to-point routing in wireless
sensornets. In NSDI 05, 2005.