A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from...

Full description

Bibliographic Details
Main Authors: Chi-Sung Laih, Shang-Ming Jen, Wen-Chung Kuo
Format: Article
Language:English
Published: MDPI AG 2009-06-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/9/6/5022/
_version_ 1818040419159638016
author Chi-Sung Laih
Shang-Ming Jen
Wen-Chung Kuo
author_facet Chi-Sung Laih
Shang-Ming Jen
Wen-Chung Kuo
author_sort Chi-Sung Laih
collection DOAJ
description MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA.
first_indexed 2024-12-10T08:14:13Z
format Article
id doaj.art-f9ef8d6257a848abb31c9cf9190e726e
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-12-10T08:14:13Z
publishDate 2009-06-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-f9ef8d6257a848abb31c9cf9190e726e2022-12-22T01:56:31ZengMDPI AGSensors1424-82202009-06-01965022503910.3390/s90605022A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANETChi-Sung LaihShang-Ming JenWen-Chung KuoMANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA.http://www.mdpi.com/1424-8220/9/6/5022/ad hoc networkhop-count analysisMHAnetwork securitywormhole attack
spellingShingle Chi-Sung Laih
Shang-Ming Jen
Wen-Chung Kuo
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
Sensors
ad hoc network
hop-count analysis
MHA
network security
wormhole attack
title A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_full A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_fullStr A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_full_unstemmed A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_short A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
title_sort hop count analysis scheme for avoiding wormhole attacks in manet
topic ad hoc network
hop-count analysis
MHA
network security
wormhole attack
url http://www.mdpi.com/1424-8220/9/6/5022/
work_keys_str_mv AT chisunglaih ahopcountanalysisschemeforavoidingwormholeattacksinmanet
AT shangmingjen ahopcountanalysisschemeforavoidingwormholeattacksinmanet
AT wenchungkuo ahopcountanalysisschemeforavoidingwormholeattacksinmanet
AT chisunglaih hopcountanalysisschemeforavoidingwormholeattacksinmanet
AT shangmingjen hopcountanalysisschemeforavoidingwormholeattacksinmanet
AT wenchungkuo hopcountanalysisschemeforavoidingwormholeattacksinmanet