Enhanced Augmented IP Routing Protocol (EAIRP) in IPv6 Environment
Electronic Commerce Research
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Security of a Mobile Transaction: A Trust Model
Electronic Commerce Research
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
Electronic Commerce Research
Location-based services deployment and demand: a roadmap model
Electronic Commerce Research
Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
An empirical examination of user adoption of location-based services
Electronic Commerce Research
Hi-index | 0.00 |
Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism.