2013
DOI: 10.1007/s10660-013-9122-3
|View full text |Cite
|
Sign up to set email alerts
|

A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology

Abstract: Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…The P2PM scheme proposed by Martı´nez-Pela´ez et al (2015) have a wireless public key infrastructure with an efficient certificate path validation to provide security against well-known attacks and reduce the processing time. Shi et al (2013) provided a countermeasure named bi-directional wormhole location mechanism to solve the colluding wormhole attack.…”
Section: Factor 4: Mobile Payment Services Schemesmentioning
confidence: 99%
“…The P2PM scheme proposed by Martı´nez-Pela´ez et al (2015) have a wireless public key infrastructure with an efficient certificate path validation to provide security against well-known attacks and reduce the processing time. Shi et al (2013) provided a countermeasure named bi-directional wormhole location mechanism to solve the colluding wormhole attack.…”
Section: Factor 4: Mobile Payment Services Schemesmentioning
confidence: 99%
“…In study of countermeasures against wormhole attacks in MANETs using analytical hierarchy process methodology [14] proposed by Fei Shi, Weijie Liu, Dongxu Jin and Jooseok Song, aims to elect local most trustable nodes for source and destination to detect and locate wormholes using analytical hierarchy process. The authors proposed electing LMT nodes with largest weight value for source and destination by using relative stability of node, credit value of node and reciprocal of forward rate of node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Also, it is only used in static networks [5]. Shi et al (2013), proposed a method to detect and isolate wormhole attacks in mobile ad hoc networks (MANETs). This method utilizes analytical hierarchy process to elect some special nodes, named the local most trustable (LMT) nodes, for the source and the destination node, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, the node's weight value must be recalculated, and the problem mentioned above may arise again. If the node moves frequently, this problem may become more serious [6].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation