2008 Second International Conference on Emerging Security Information, Systems and Technologies 2008
DOI: 10.1109/securware.2008.36
|View full text |Cite
|
Sign up to set email alerts
|

FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks

Abstract: In this paper, we present a very simple and efficient endto-end algorithm to handle wormhole attacks on ad hoc networks with variable ranges of communication. Most of the existing approaches focus on the prevention of wormholes between neighbors that trust each other. The known end-toend mechanisms assume that all the nodes of the network have same communication range. To the best of our knowledge this is the first attempt to handle variable ranges of the nodes in an ad hoc network where only the source and th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 10 publications
(10 reference statements)
0
7
0
Order By: Relevance
“…FEEPVR (First end-to-end protocol to secure Ad Hoc Networks with Variable range) [6] detects wormhole node based on the number of hops and location information. A path is suspected of wormhole if the number of hop count for a route is less than the minimum lower bound.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…FEEPVR (First end-to-end protocol to secure Ad Hoc Networks with Variable range) [6] detects wormhole node based on the number of hops and location information. A path is suspected of wormhole if the number of hop count for a route is less than the minimum lower bound.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Based on the principle of detection mechanism, the existing techniques of detecting and preventing wormhole attacks can be classified into five types [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23], clock synchronization, hardware-used methods, statistical analysis, neighbor-related methods and key-based methods.…”
Section: Related Workmentioning
confidence: 99%
“…A very simple end-to-end algorithm to handle wormhole attacks on ad hoc networks with variable communication ranges was presented. [20] Black Hole Attack…”
Section: Wormhole Attackmentioning
confidence: 99%