ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Secure neighbor discovery in wireless networks: formal investigation of possibility
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A Novel Approach for Security and Robustness in Wireless Embedded Systems
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A practical secure neighbor verification protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
IEEE Transactions on Wireless Communications
d-key dynamic encryption: a security enhancement protocol for mobile ad hoc network
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
FKM: a fingerprint-based key management protocol for SoC-based sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Wormhole-resilient secure neighbor discovery in underwater acoustic networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Local connectivity tests to identify wormholes in wireless networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Wormholes no more? localized wormhole detection and prevention in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies
Mobile Networks and Applications
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
Cross-layer metrics for reliable routing in wireless mesh networks
IEEE/ACM Transactions on Networking (TON)
Journal of Computer and System Sciences
Hi-index | 0.00 |
In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual linkunder attacker control. Proposed countermeasures to this attack use tight clock synchronization, specialized hardware, oroverhearing, making them difficult to realize in practice. TrueLink is a timing based countermeasure to the wormhole attack.Using TrueLink, a node i can verify the existence of a direct link to an apparent neighbor, j. Verification of a link i 驴j operates in two phases. In the rendezvous phase, the nodes exchange nonces 驴j and βi. This is done with tight timing constraints,within which it is impossible for attackers to forward the exchange between distant nodes. In the authentication phase, iand j transmit a signed message (驴j, βi), mutually authenticating themselves as the originator of their respective nonce.TrueLink does not rely on precise clock synchronization, GPS coordinates, overhearing, geometric inconsistencies, or statisticalmethods. It can be implemented using only standard IEEE 802.11 hardware with a minor backwards compatible firmware update.TrueLink is meant to be used together with a secure routing protocol. Such protocols require an authentication mechanism,which will also be used by TrueLink. TrueLink is virtually independent of the routing protocol used. Our performance evaluationshows that TrueLink provides effective protection against potentially devastating wormhole attacks.