Cargando…

A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from...

Descripción completa

Detalles Bibliográficos
Autores principales: Jen, Shang-Ming, Laih, Chi-Sung, Kuo, Wen-Chung
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2009
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3291951/
https://www.ncbi.nlm.nih.gov/pubmed/22408566
http://dx.doi.org/10.3390/s90605022
_version_ 1782225204812972032
author Jen, Shang-Ming
Laih, Chi-Sung
Kuo, Wen-Chung
author_facet Jen, Shang-Ming
Laih, Chi-Sung
Kuo, Wen-Chung
author_sort Jen, Shang-Ming
collection PubMed
description MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA.
format Online
Article
Text
id pubmed-3291951
institution National Center for Biotechnology Information
language English
publishDate 2009
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-32919512012-03-09 A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET Jen, Shang-Ming Laih, Chi-Sung Kuo, Wen-Chung Sensors (Basel) Article MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. Molecular Diversity Preservation International (MDPI) 2009-06-24 /pmc/articles/PMC3291951/ /pubmed/22408566 http://dx.doi.org/10.3390/s90605022 Text en © 2009 by the authors; licensee Molecular Diversity Preservation International, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Jen, Shang-Ming
Laih, Chi-Sung
Kuo, Wen-Chung
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_full A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_fullStr A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_full_unstemmed A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_short A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_sort hop-count analysis scheme for avoiding wormhole attacks in manet
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3291951/
https://www.ncbi.nlm.nih.gov/pubmed/22408566
http://dx.doi.org/10.3390/s90605022
work_keys_str_mv AT jenshangming ahopcountanalysisschemeforavoidingwormholeattacksinmanet
AT laihchisung ahopcountanalysisschemeforavoidingwormholeattacksinmanet
AT kuowenchung ahopcountanalysisschemeforavoidingwormholeattacksinmanet
AT jenshangming hopcountanalysisschemeforavoidingwormholeattacksinmanet
AT laihchisung hopcountanalysisschemeforavoidingwormholeattacksinmanet
AT kuowenchung hopcountanalysisschemeforavoidingwormholeattacksinmanet