A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology

Fei Shi, Weijie Liu, Dongxu Jin, Joo Seok Song

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism.

Original languageEnglish
Pages (from-to)329-345
Number of pages17
JournalElectronic Commerce Research
Volume13
Issue number3
DOIs
Publication statusPublished - 2013 Sep 1

Fingerprint

Mobile ad hoc networks
Countermeasures
Attack
Analytical hierarchy process
Methodology
Node

All Science Journal Classification (ASJC) codes

  • Economics, Econometrics and Finance (miscellaneous)
  • Human-Computer Interaction

Cite this

@article{5081a310bb76431ba9cba9c605afc892,
title = "A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology",
abstract = "Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism.",
author = "Fei Shi and Weijie Liu and Dongxu Jin and Song, {Joo Seok}",
year = "2013",
month = "9",
day = "1",
doi = "10.1007/s10660-013-9122-3",
language = "English",
volume = "13",
pages = "329--345",
journal = "Electronic Commerce Research",
issn = "1389-5753",
publisher = "Kluwer Academic Publishers",
number = "3",

}

A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology. / Shi, Fei; Liu, Weijie; Jin, Dongxu; Song, Joo Seok.

In: Electronic Commerce Research, Vol. 13, No. 3, 01.09.2013, p. 329-345.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology

AU - Shi, Fei

AU - Liu, Weijie

AU - Jin, Dongxu

AU - Song, Joo Seok

PY - 2013/9/1

Y1 - 2013/9/1

N2 - Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism.

AB - Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism.

UR - http://www.scopus.com/inward/record.url?scp=84886295373&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84886295373&partnerID=8YFLogxK

U2 - 10.1007/s10660-013-9122-3

DO - 10.1007/s10660-013-9122-3

M3 - Article

VL - 13

SP - 329

EP - 345

JO - Electronic Commerce Research

JF - Electronic Commerce Research

SN - 1389-5753

IS - 3

ER -