Cargando…
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Molecular Diversity Preservation International (MDPI)
2009
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3291951/ https://www.ncbi.nlm.nih.gov/pubmed/22408566 http://dx.doi.org/10.3390/s90605022 |
_version_ | 1782225204812972032 |
---|---|
author | Jen, Shang-Ming Laih, Chi-Sung Kuo, Wen-Chung |
author_facet | Jen, Shang-Ming Laih, Chi-Sung Kuo, Wen-Chung |
author_sort | Jen, Shang-Ming |
collection | PubMed |
description | MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. |
format | Online Article Text |
id | pubmed-3291951 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2009 |
publisher | Molecular Diversity Preservation International (MDPI) |
record_format | MEDLINE/PubMed |
spelling | pubmed-32919512012-03-09 A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET Jen, Shang-Ming Laih, Chi-Sung Kuo, Wen-Chung Sensors (Basel) Article MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. Molecular Diversity Preservation International (MDPI) 2009-06-24 /pmc/articles/PMC3291951/ /pubmed/22408566 http://dx.doi.org/10.3390/s90605022 Text en © 2009 by the authors; licensee Molecular Diversity Preservation International, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Jen, Shang-Ming Laih, Chi-Sung Kuo, Wen-Chung A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_full | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_fullStr | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_full_unstemmed | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_short | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_sort | hop-count analysis scheme for avoiding wormhole attacks in manet |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3291951/ https://www.ncbi.nlm.nih.gov/pubmed/22408566 http://dx.doi.org/10.3390/s90605022 |
work_keys_str_mv | AT jenshangming ahopcountanalysisschemeforavoidingwormholeattacksinmanet AT laihchisung ahopcountanalysisschemeforavoidingwormholeattacksinmanet AT kuowenchung ahopcountanalysisschemeforavoidingwormholeattacksinmanet AT jenshangming hopcountanalysisschemeforavoidingwormholeattacksinmanet AT laihchisung hopcountanalysisschemeforavoidingwormholeattacksinmanet AT kuowenchung hopcountanalysisschemeforavoidingwormholeattacksinmanet |