2012
DOI: 10.1002/dac.2397
|View full text |Cite
|
Sign up to set email alerts
|

Topological comparison‐based wormhole detection for MANET

Abstract: Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormhole attack can be further divided into two categories: traditional wormhole attack and Byzantine wormhole attack. Existing res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 15 publications
(23 reference statements)
0
4
0
Order By: Relevance
“…Similarly, our proposed work is also compared with related work of Chan and Alam protocol [31] and the experimental results are shown in Tables 6 and 7.…”
Section: Results Analysis Under Internal Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, our proposed work is also compared with related work of Chan and Alam protocol [31] and the experimental results are shown in Tables 6 and 7.…”
Section: Results Analysis Under Internal Attackmentioning
confidence: 99%
“…The protocol was based on the following observations-generate neighbour list, Calculate RTT avg and TC. However, the delay in RTT may be caused due to processing time (PT) of RREQ and RREP under multi-rate scenario which leads to false detection rate [31]. In 2013, a protocol based on the extension of the existing watchdog scheme had proposed in [32].…”
Section: Related Workmentioning
confidence: 99%
“…Internet of Thing (IoT), which is one of the most important and powerful communication paradigms of the 21st century has been a considerable attention from last few years [1]- [3]. It has been widely used in many fields, such as industrial control [4], network physical system [5], public security equipment [6], military investigation [7]. With the development of the intelligent and cognitive techniques, we enter the IoT era in which the communication network is becoming increasingly dynamic, the IoT technology is being confronted with a series of new challenges [8]- [12], more secure and reliable IoT device recognition technology need to be researched to adapt to the increasingly complex application environment.…”
Section: Introductionmentioning
confidence: 99%
“…A Mobile Ad‐hoc Network (MANET) is such an autonomous system operating in decentralized and distributed manner where mobile nodes connect spontaneously without a fixed infrastructure. Because of geographical independence and impulsive deployment, MANETs have become an attractive option for applications such as maritime communications, battlefield operations, distributed collaborative computing, disaster management system, ad‐hoc meeting, intelligent transportation system, medical fields and many more .…”
Section: Introductionmentioning
confidence: 99%