Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

WAP: Wormhole Attack Prevention algorithm in mobile ad hoc networks

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Sun-
dc.contributor.authorKim, Doo-Young-
dc.contributor.authorLee, Do-Hyeon-
dc.contributor.authorJung, Jaeil-
dc.date.accessioned2022-12-21T02:15:27Z-
dc.date.available2022-12-21T02:15:27Z-
dc.date.created2022-09-16-
dc.date.issued2008-06-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/178283-
dc.description.abstractIn wireless ad hoc networks, nodes compromise to forward packets for each other to communicate beyond their transmission range. Therefore, networks are vulnerable to wormhole attacks launched through compromised nodes because malicious nodes can easily participate in the networks. In wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them. It is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Previous algorithms detecting a wormhole require special hardware or tight time synchronization. In this paper, we develop an effective method called Wormhole Attack Prevention (WAP) without using specialized hardware. The WAP not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during the route discovery phase. Simulation results show that wormholes can be detected and isolated within the route discovery phase.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-
dc.titleWAP: Wormhole Attack Prevention algorithm in mobile ad hoc networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorJung, Jaeil-
dc.identifier.doi10.1109/SUTC.2008.49-
dc.identifier.scopusid2-s2.0-50949092585-
dc.identifier.bibliographicCitationProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp.343 - 348-
dc.relation.isPartOfProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing-
dc.citation.titleProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing-
dc.citation.startPage343-
dc.citation.endPage348-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusCellular telephone systems-
dc.subject.keywordPlusComputer networks-
dc.subject.keywordPlusSensor networks-
dc.subject.keywordPlusSensors-
dc.subject.keywordPlusTelecommunication networks-
dc.subject.keywordPlusUbiquitous computing-
dc.subject.keywordPlusWireless telecommunication systems-
dc.subject.keywordPlusWorm-hole attack-
dc.subject.keywordPlusAd hoc networks-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/4545782-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Jaeil photo

Jung, Jaeil
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE