A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2009-06-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/9/6/5022/ |
_version_ | 1818040419159638016 |
---|---|
author | Chi-Sung Laih Shang-Ming Jen Wen-Chung Kuo |
author_facet | Chi-Sung Laih Shang-Ming Jen Wen-Chung Kuo |
author_sort | Chi-Sung Laih |
collection | DOAJ |
description | MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. |
first_indexed | 2024-12-10T08:14:13Z |
format | Article |
id | doaj.art-f9ef8d6257a848abb31c9cf9190e726e |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-12-10T08:14:13Z |
publishDate | 2009-06-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-f9ef8d6257a848abb31c9cf9190e726e2022-12-22T01:56:31ZengMDPI AGSensors1424-82202009-06-01965022503910.3390/s90605022A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANETChi-Sung LaihShang-Ming JenWen-Chung KuoMANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA.http://www.mdpi.com/1424-8220/9/6/5022/ad hoc networkhop-count analysisMHAnetwork securitywormhole attack |
spellingShingle | Chi-Sung Laih Shang-Ming Jen Wen-Chung Kuo A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET Sensors ad hoc network hop-count analysis MHA network security wormhole attack |
title | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_full | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_fullStr | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_full_unstemmed | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_short | A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET |
title_sort | hop count analysis scheme for avoiding wormhole attacks in manet |
topic | ad hoc network hop-count analysis MHA network security wormhole attack |
url | http://www.mdpi.com/1424-8220/9/6/5022/ |
work_keys_str_mv | AT chisunglaih ahopcountanalysisschemeforavoidingwormholeattacksinmanet AT shangmingjen ahopcountanalysisschemeforavoidingwormholeattacksinmanet AT wenchungkuo ahopcountanalysisschemeforavoidingwormholeattacksinmanet AT chisunglaih hopcountanalysisschemeforavoidingwormholeattacksinmanet AT shangmingjen hopcountanalysisschemeforavoidingwormholeattacksinmanet AT wenchungkuo hopcountanalysisschemeforavoidingwormholeattacksinmanet |