Joonsu Ryu’s research while affiliated with Sogang University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


FIGURE 2. Example of ideal (above) and actual (below) number of hops taken for communication.
FIGURE 5. Ratio of the packets passing the wormhole tunnel under the dynamic source routing (DSR) protocol.
FIGURE 6. Ratio of the packets passing the wormhole tunnel under the ad hoc on-demand distance vector routing (AODV) protocol.
FIGURE 7. Ratio of the packets passing the wormhole tunnel under the opportunistic routing (OR) protocol.
Trust System- and Multiple Verification Technique-Based Method for Detecting Wormhole Attacks in MANETs
  • Article
  • Full-text available

January 2024

·

49 Reads

·

10 Citations

IEEE Access

Joonsu Ryu

·

Sungwook Kim

The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET) technologies, which enable the formation of networks without infrastructure assistance, gaining increased attention. The advancements in these technologies have also resulted in the variety of attacks targeting them becoming more diversified. Particularly, owing to their inability to ensure node reliability, MANETs are vulnerable to routing attacks such as wormhole attacks. Since wormhole attacks often do not directly damage networks, detecting them can be challenging. In response, we propose a novel multiple verification-based wormhole attack detection method that leverages the characteristics of such attacks. The proposed method measures the credit of each node based on a trust system. The trust levels of suspicious nodes are reduced during routing; those with trust levels below a certain threshold are considered malicious. This trust system was implemented using reinforcement learning, which improves the accuracy of the system over time. Simulation experiments in which the proposed method was applied to existing routing methods in a densely populated environment were conducted; the rate of traffic passing through paths with malicious nodes was significantly reduced.

Download

Citations (1)


... Energy-efficient routing in MANETs is essential to prolong network lifetime and ensure stable communication among mobile nodes with limited battery power. In order to achieve efficient data packet, many optimization techniques are applied [10][11][12]. The optimization approaches including Bacteria for Aging Optimization Algorithm (BFOA), Ant Colony Optimization (ACO), Adaptive Neuro-Fuzzy Inference System (ANFIS)-based Grey Wolf Optimization (ANFIS-GWO) [13][14]. ...

Reference:

Energy-Efficient Routing in MANET using Mountain Gazelle Optimizer and LEACH-Based Clustering
Trust System- and Multiple Verification Technique-Based Method for Detecting Wormhole Attacks in MANETs

IEEE Access