A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods

In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormho...

Full description

Saved in:
Bibliographic Details
Main Authors: Dong-uk Kim, Hyo-won Kim, Gisung Kim, Sehun Kim
Format: Article
Language:English
Published: Wiley 2013-03-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2013/184931
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850169161517367296
author Dong-uk Kim
Hyo-won Kim
Gisung Kim
Sehun Kim
author_facet Dong-uk Kim
Hyo-won Kim
Gisung Kim
Sehun Kim
author_sort Dong-uk Kim
collection DOAJ
description In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ's starting time to evade our proposed method, we can detect this counterattack using the RREQ's transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker's counterattack.
format Article
id doaj-art-a682bea34e5f446d848cdab732ad5c59
institution OA Journals
issn 1550-1477
language English
publishDate 2013-03-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-a682bea34e5f446d848cdab732ad5c592025-08-20T02:20:48ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-03-01910.1155/2013/184931A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection MethodsDong-uk Kim0Hyo-won Kim1Gisung Kim2Sehun Kim3 Department of Industrial & Systems Engineering and Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea Department of Industrial & Systems Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea Department of Industrial & Systems Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea Department of Industrial & Systems Engineering and Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of KoreaIn recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ's starting time to evade our proposed method, we can detect this counterattack using the RREQ's transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker's counterattack.https://doi.org/10.1155/2013/184931
spellingShingle Dong-uk Kim
Hyo-won Kim
Gisung Kim
Sehun Kim
A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
International Journal of Distributed Sensor Networks
title A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
title_full A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
title_fullStr A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
title_full_unstemmed A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
title_short A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
title_sort counterattack detection scheme in transmission time based wormhole detection methods
url https://doi.org/10.1155/2013/184931
work_keys_str_mv AT dongukkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT hyowonkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT gisungkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT sehunkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT dongukkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT hyowonkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT gisungkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods
AT sehunkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods