{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:07Z","timestamp":1761621127018,"version":"3.40.4"},"reference-count":18,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T00:00:00Z","timestamp":1361491200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2014,2]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>In mobile ad hoc networks (MANETs), nodes are mobile in nature, but at the same time, they are assumed to rely on each other to relay their traffic even in case the wireless transmission medium is out of range. This requirement poses a serious challenge when malicious nodes are present in the MANET and may contribute to the routing operations, either by tampering the data packets or dropping them. This paper addresses this particular type of wormhole attacks, by introducing an enhancement (the so\u2010called E\u2010HSAM) to a recently proposed ad hoc on\u2010demand distance vector\u2010based protocol for preventing against such attacks in MANETs (the so\u2010called highly secured approach against attacks on MANETs (HSAM)). Our contributions are twofold: (i) a simulation study of the HSAM protocol is provided for the first time, and (ii) the Advanced Encryption Standard (AES) is introduced in the route selection phase of E\u2010HSAM (yielding our so\u2010called E\u2010HSAM\u2010AES scheme) to strengthen the integrity of the data while securing the potential routes chosen for data transfer from source to destination nodes. Simulation results are presented, showing the superiority of E\u2010HSAM\u2010AES over E\u2010HSAM and HSAM in terms of packet delivery ratio and broken link detected during data transmission, chosen as performance metrics. Copyright \u00a9 2013 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.731","type":"journal-article","created":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T15:56:24Z","timestamp":1361548584000},"page":"376-384","source":"Crossref","is-referenced-by-count":9,"title":["A cryptography\u2010based protocol against packet dropping and message tampering attacks on mobile ad hoc networks"],"prefix":"10.1002","volume":"7","author":[{"given":"Mohammad S.","family":"Obaidat","sequence":"first","affiliation":[{"name":"Department of Computer Science and Software Engineering Monmouth University West Long Branch NJ 07764 U.S.A."}]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[{"name":"Department of Computer Science Ryerson University Toronto Ontario M5B 2K3 Canada"}]},{"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[{"name":"Division of Information Technology, Netaji Subhas Institute of Technology University of Delhi India"}]},{"given":"Vincent","family":"Koo","sequence":"additional","affiliation":[{"name":"Department of Computer Science Ryerson University Toronto Ontario M5B 2K3 Canada"}]}],"member":"311","published-online":{"date-parts":[[2013,2,22]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_8_2_1","DOI":"10.7763\/IJCTE.2010.V2.246"},{"unstructured":"Global mobile information systems simulation library (GloMoSim) 2012.http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/[Aug. 15 2012].","key":"e_1_2_8_3_1"},{"doi-asserted-by":"publisher","key":"e_1_2_8_4_1","DOI":"10.1109\/MCOM.2002.1006971"},{"doi-asserted-by":"crossref","unstructured":"NasserN YunfengC.Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. InProc.of the IEEE International Conference on Communications Vol. 07 June 24\u201328 2007;1154\u20131159.","key":"e_1_2_8_5_1","DOI":"10.1109\/ICC.2007.196"},{"issue":"1","key":"e_1_2_8_6_1","first-page":"181","article-title":"Detection and accusation of packet forwarding misbehavior in mobile ad\u2010hoc networks","volume":"2","author":"Gonzalez OF","year":"2008","journal-title":"Journal of Internet Engineering"},{"doi-asserted-by":"crossref","unstructured":"ChoiS KimD\u2010Y LeeD\u2010H JungJ\u2010I.WAP: wormhole attack prevention algorithm in mobile ad hoc networks. InProc.of the International Conference on Sensor Networks Ubiquitous&Trustworthy Computing (SUTC'08) Taichung Taiwan June 11\u201313 2008;343\u2013348.","key":"e_1_2_8_7_1","DOI":"10.1109\/SUTC.2008.49"},{"issue":"10","key":"e_1_2_8_8_1","first-page":"184","article-title":"A reliable and secure framework for detection and isolation of malicious nodes in MANET","volume":"8","author":"Dhanalakshmi S","year":"2008","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"doi-asserted-by":"publisher","key":"e_1_2_8_9_1","DOI":"10.1109\/TVT.2008.923683"},{"doi-asserted-by":"crossref","unstructured":"LiX LuR LiangX ShenX.Side channel monitoring: packet drop attack detection in wireless ad hoc networks. InProc.of the IEEE Intl.Conference on Communications(ICC\u201911) Kyoto Japan June 5\u20139 2011.","key":"e_1_2_8_10_1","DOI":"10.1109\/icc.2011.5963331"},{"doi-asserted-by":"publisher","key":"e_1_2_8_11_1","DOI":"10.5120\/165-290"},{"doi-asserted-by":"crossref","unstructured":"DhurandherSK WoungangI GuptaA BhargavaB.E2SIW: an energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. InProc.of the 8th Intl.Workshop on Heterogeneous Wireless Networks(HWISE\u201912) held in conjunction with AINA 2012 Fukuoka Japan March 26\u201329 2012.","key":"e_1_2_8_12_1","DOI":"10.1109\/WAINA.2012.85"},{"unstructured":"LiuC WoungangI ChaoH\u2010C DhurandherSK ChiT\u2010Y ObaidatMS.Message security in multipath ad hoc networks using a neural network\u2010based cipher. InProc.of the IEEE GLOBECOM 2011 Houston Texas USA Dec. 5\u20139 2011.","key":"e_1_2_8_13_1"},{"doi-asserted-by":"crossref","unstructured":"HuY PerrigA JohnsonD.Packet leashes: a defence against wormhole attacks in wireless networks. InProc.of INFOCOM 2003 Vol. 3 2003;1976\u20131986.","key":"e_1_2_8_14_1","DOI":"10.1109\/INFCOM.2003.1209219"},{"doi-asserted-by":"crossref","unstructured":"ErikssonJ KrishnamurthySV FaloutsosM.TrueLink: a practical countermeasure to the wormhole attack in wireless networks. InProc.of 14th Intl.Conference on Network Protocols(ICNP\u201906) Santa Barbara CA USA Nov. 12\u201315 2006;75\u201384.","key":"e_1_2_8_15_1","DOI":"10.1109\/ICNP.2006.320200"},{"key":"e_1_2_8_16_1","first-page":"12","article-title":"MANET routing protocols and wormhole attack against AODV","volume":"10","author":"Jhaveri R","year":"2010","journal-title":"International Journal of Computer Science and Network Security"},{"doi-asserted-by":"crossref","unstructured":"MaheshwariR GaoJ DasSR.Detecting wormhole attacks in wireless networks using conectivity information. InProc.of 26th IEEE INFOCOM\u201907 Anchorage Alaska USA May 6\u201312 2007;107\u2013115.","key":"e_1_2_8_17_1","DOI":"10.1109\/INFCOM.2007.21"},{"doi-asserted-by":"crossref","unstructured":"ObaidatMS WoungangI DhurandherSK KooV.Preventing packet dropping and message tampering attacks on aodv\u2010based mobile ad hoc networks. InPress Proc.of the Intl.Conference on Computer Information and Telecommunication Systems(CITS 2012) Amman Jordan May 13\u201316 2012.","key":"e_1_2_8_18_1","DOI":"10.1109\/CITS.2012.6220366"},{"doi-asserted-by":"crossref","unstructured":"WangY HuM.Timing evaluation of the known cryptographic algorithms. InProc.of the Intl.Conference on Computational Intelligence and Security(CIS'09) Beijing China Dec. 11\u201314 2009;233\u2013237.","key":"e_1_2_8_19_1","DOI":"10.1109\/CIS.2009.81"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T21:59:15Z","timestamp":1745963955000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,22]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["10.1002\/sec.731"],"URL":"https:\/\/doi.org\/10.1002\/sec.731","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2013,2,22]]}}}