@article{ART001714808},
author={Lee, Byung-kwan and Jeong Eun Hee},
title={A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2012},
volume={17},
number={11},
pages={73-81}
TY - JOUR
AU - Lee, Byung-kwan
AU - Jeong Eun Hee
TI - A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc
JO - Journal of The Korea Society of Computer and Information
PY - 2012
VL - 17
IS - 11
PB - The Korean Society Of Computer And Information
SP - 73
EP - 81
SN - 1598-849X
AB - This paper proposes an ETWAD(Encapsulation and TunnelingWormhole Attack Detection) design based on positional information and hop count on Ad-Hoc Network. The ETWAD technique is designed for generating GAK(Group Authentication Key) to ascertain the node ID and group key within Ad-hoc Network and authenticating a member of Ad-hoc Network by appending it to RREQ and RREP. In addition, A GeoWAD algorithmdetecting Encapsulation and TunnelingWormhole Attack by using a hop count about the number of Hops within RREPmessage and a critical value about the distance between a source node S and a destination node Dis also presented in ETWADtechnique. Therefore, as this paper is estimated as the average probability of Wormhole Attack detection 91%and average FPR 4.4%, it improves the reliability and probability of Wormhole Attack Detection.
KW - Wormhole Attack Detection;Positional Information;HopCount;Group Authentication Key;Ad-hoc Network
DO -
UR -
ER -
Lee, Byung-kwan and Jeong Eun Hee. (2012). A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc. Journal of The Korea Society of Computer and Information, 17(11), 73-81.
Lee, Byung-kwan and Jeong Eun Hee. 2012, "A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc", Journal of The Korea Society of Computer and Information, vol.17, no.11 pp.73-81.
Lee, Byung-kwan, Jeong Eun Hee "A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc" Journal of The Korea Society of Computer and Information 17.11 pp.73-81 (2012) : 73.
Lee, Byung-kwan, Jeong Eun Hee. A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc. 2012; 17(11), 73-81.
Lee, Byung-kwan and Jeong Eun Hee. "A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc" Journal of The Korea Society of Computer and Information 17, no.11 (2012) : 73-81.
Lee, Byung-kwan; Jeong Eun Hee. A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc. Journal of The Korea Society of Computer and Information, 17(11), 73-81.
Lee, Byung-kwan; Jeong Eun Hee. A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc. Journal of The Korea Society of Computer and Information. 2012; 17(11) 73-81.
Lee, Byung-kwan, Jeong Eun Hee. A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc. 2012; 17(11), 73-81.
Lee, Byung-kwan and Jeong Eun Hee. "A Design of ETWAD(Encapsulation and TunnelingWormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc" Journal of The Korea Society of Computer and Information 17, no.11 (2012) : 73-81.