Wormhole attacks in wireless networks
Top Cited Papers
- 6 February 2006
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 24 (2), 370-380
- https://doi.org/10.1109/jsac.2005.861394
Abstract
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.This publication has 22 references indexed in Scilit:
- Dynamic Source Routing in Ad Hoc Wireless NetworksPublished by Springer Science and Business Media LLC ,2007
- A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networksWireless Networks, 2006
- Visualization of wormholes in sensor networksPublished by Association for Computing Machinery (ACM) ,2004
- Securing the Nimrod routing architecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- Next century challengesPublished by Association for Computing Machinery (ACM) ,1999
- Efficient signature generation by smart cardsJournal of Cryptology, 1991
- How to construct random functionsJournal of the ACM, 1986
- Theory of Spread-Spectrum Communications - A TutorialIEEE Transactions on Communications, 1982
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978