{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T09:59:29Z","timestamp":1720519169858},"reference-count":20,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,3,1]]},"abstract":"<jats:p> In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ's starting time to evade our proposed method, we can detect this counterattack using the RREQ's transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker's counterattack. <\/jats:p>","DOI":"10.1155\/2013\/184931","type":"journal-article","created":{"date-parts":[[2013,3,31]],"date-time":"2013-03-31T21:00:49Z","timestamp":1364763649000},"page":"184931","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods"],"prefix":"10.1177","volume":"9","author":[{"given":"Dong-uk","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Industrial & Systems Engineering and Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea"}]},{"given":"Hyo-won","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Industrial & Systems Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea"}]},{"given":"Gisung","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Industrial & Systems Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea"}]},{"given":"Sehun","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Industrial & Systems Engineering and Graduate School of Information Security, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-Gu, Daejeon 305-701, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,3,31]]},"reference":[{"key":"B1-2013-184931","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"B2-2013-184931","first-page":"251","volume-title":"Proceedings of the International Conference on Network Protocols (ICNP \u203201)","author":"Kong J."},{"key":"B3-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"B4-2013-184931","first-page":"354","volume-title":"Proceedings of the Symposium on Applications and the Internet Workshops (SAINT\u201903)","author":"Kaliaperumal S."},{"key":"B5-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2007.4414457"},{"key":"B6-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481351"},{"key":"B7-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.14"},{"key":"B8-2013-184931","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39611-6_13"},{"key":"B9-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"B10-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.070536"},{"key":"B11-2013-184931","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.04.001"},{"key":"B12-2013-184931","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0243-9"},{"key":"B13-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.22"},{"key":"B14-2013-184931","first-page":"119","volume-title":"Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT \u203211)","author":"Ganapathy S."},{"key":"B15-2013-184931","volume":"2011","author":"Lee S.","year":"2011","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"B20-2013-184931","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.005"},{"key":"B16-2013-184931","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"B17-2013-184931","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2009.01.008"},{"key":"B18-2013-184931","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"B19-2013-184931","volume-title":"Proceedings of the 5th International ICST Mobile Multimedia Communications Conference (Mobimedia \u203209)","author":"Emmanouil A. P."}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/184931","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/184931","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/184931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T13:36:29Z","timestamp":1621172189000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/184931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,1]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,3,1]]}},"alternative-id":["10.1155\/2013\/184931"],"URL":"https:\/\/doi.org\/10.1155\/2013\/184931","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,1]]}}}