WAP: Wormhole Attack Prevention algorithm in mobile ad hoc networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Sun | - |
dc.contributor.author | Kim, Doo-Young | - |
dc.contributor.author | Lee, Do-Hyeon | - |
dc.contributor.author | Jung, Jaeil | - |
dc.date.accessioned | 2022-12-21T02:15:27Z | - |
dc.date.available | 2022-12-21T02:15:27Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2008-06 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/178283 | - |
dc.description.abstract | In wireless ad hoc networks, nodes compromise to forward packets for each other to communicate beyond their transmission range. Therefore, networks are vulnerable to wormhole attacks launched through compromised nodes because malicious nodes can easily participate in the networks. In wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them. It is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Previous algorithms detecting a wormhole require special hardware or tight time synchronization. In this paper, we develop an effective method called Wormhole Attack Prevention (WAP) without using specialized hardware. The WAP not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during the route discovery phase. Simulation results show that wormholes can be detected and isolated within the route discovery phase. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | WAP: Wormhole Attack Prevention algorithm in mobile ad hoc networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jung, Jaeil | - |
dc.identifier.doi | 10.1109/SUTC.2008.49 | - |
dc.identifier.scopusid | 2-s2.0-50949092585 | - |
dc.identifier.bibliographicCitation | Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.343 - 348 | - |
dc.relation.isPartOf | Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing | - |
dc.citation.title | Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing | - |
dc.citation.startPage | 343 | - |
dc.citation.endPage | 348 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Cellular telephone systems | - |
dc.subject.keywordPlus | Computer networks | - |
dc.subject.keywordPlus | Sensor networks | - |
dc.subject.keywordPlus | Sensors | - |
dc.subject.keywordPlus | Telecommunication networks | - |
dc.subject.keywordPlus | Ubiquitous computing | - |
dc.subject.keywordPlus | Wireless telecommunication systems | - |
dc.subject.keywordPlus | Worm-hole attack | - |
dc.subject.keywordPlus | Ad hoc networks | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/4545782 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.