A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods
In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormho...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-03-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2013/184931 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850169161517367296 |
|---|---|
| author | Dong-uk Kim Hyo-won Kim Gisung Kim Sehun Kim |
| author_facet | Dong-uk Kim Hyo-won Kim Gisung Kim Sehun Kim |
| author_sort | Dong-uk Kim |
| collection | DOAJ |
| description | In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ's starting time to evade our proposed method, we can detect this counterattack using the RREQ's transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker's counterattack. |
| format | Article |
| id | doaj-art-a682bea34e5f446d848cdab732ad5c59 |
| institution | OA Journals |
| issn | 1550-1477 |
| language | English |
| publishDate | 2013-03-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-a682bea34e5f446d848cdab732ad5c592025-08-20T02:20:48ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-03-01910.1155/2013/184931A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection MethodsDong-uk Kim0Hyo-won Kim1Gisung Kim2Sehun Kim3 Department of Industrial & Systems Engineering and Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea Department of Industrial & Systems Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea Department of Industrial & Systems Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea Department of Industrial & Systems Engineering and Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of KoreaIn recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ's starting time to evade our proposed method, we can detect this counterattack using the RREQ's transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker's counterattack.https://doi.org/10.1155/2013/184931 |
| spellingShingle | Dong-uk Kim Hyo-won Kim Gisung Kim Sehun Kim A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods International Journal of Distributed Sensor Networks |
| title | A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods |
| title_full | A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods |
| title_fullStr | A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods |
| title_full_unstemmed | A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods |
| title_short | A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods |
| title_sort | counterattack detection scheme in transmission time based wormhole detection methods |
| url | https://doi.org/10.1155/2013/184931 |
| work_keys_str_mv | AT dongukkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT hyowonkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT gisungkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT sehunkim acounterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT dongukkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT hyowonkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT gisungkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods AT sehunkim counterattackdetectionschemeintransmissiontimebasedwormholedetectionmethods |