2011
DOI: 10.1002/sec.272
|View full text |Cite
|
Sign up to set email alerts
|

End‐to‐end protocol to secure ad hoc networks against wormhole attacks

Abstract: Most of the protocols to defend ad hoc networks against wormhole attacks rely on 'trust your neighbor' relationship. In this paper, we present an end-to-end algorithm which is more efficient than the existing algorithm both in terms of space and time. As our algorithm does not require speed and time, we do not need clock synchronization.We prove that our algorithm is able to detect wormholes with tunnel length greater than or equal to {(2p − 1)/2p}k + 2/p r max , where p = r max /r min , r min is the minimum c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In MANETs, the location of a node changes due to its mobility nature. We adopt the use of GPS to obtain node location as described in [14] [15].…”
Section: Neighborhood Relationship Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…In MANETs, the location of a node changes due to its mobility nature. We adopt the use of GPS to obtain node location as described in [14] [15].…”
Section: Neighborhood Relationship Verificationmentioning
confidence: 99%
“…The wormhole attacks in Ad hoc Networks are described in [9] [12] [14] cite where the authors categorize several types of packet tunneling wormhole attacks , including wormhole through the tunnel (called out-of-band channel -OB), wormhole using encapsulation, wormhole using packet relay, and wormhole with high power transmission. Such wormhole attacks may operate in two modes: Hidden Mode (HM) and Participation Mode (PM).…”
Section: Introductionmentioning
confidence: 99%
“…In MANET, node location can't be installed manually due to all random mobility nodes. Our idea is using a GPS information to define node location automatically, as described in authors [11,16]. Notice that the actual neighbors authentication mechanism can be mistaken in mobility network topology at high speeds, will show in Section 4.1. by simulation results.…”
Section: Actual Neighbors Authenticationmentioning
confidence: 99%