Proceedings of the 4th ACM workshop on Wireless security
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Keep your enemies close: distance bounding against smartcard relay attacks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
An Error Propagation Algorithm for Ad Hoc Wireless Networks
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
The simulation and comparison of routing attacks on DSR protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Security considerations for the wireless HART protocol
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Gateway Selection Protocol in Hybrid MANET Using DYMO Routing
Mobile Networks and Applications
Security-aware routing and localization for a directional mission critical network
IEEE Journal on Selected Areas in Communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Priming: making the reaction to intrusion or fault predictable
Natural Computing: an international journal
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
Local connectivity tests to identify wormholes in wireless networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Wormholes no more? localized wormhole detection and prevention in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
A scalable wireless routing protocol secure against route truncation attacks
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Analysing routing protocols: four nodes topologies are sufficient
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies
Mobile Networks and Applications
Secure routing in MANETs using local times
Wireless Networks
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs)
Proceedings of the 2012 Information Security Curriculum Development Conference
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Enhancing performance of AODV against Black hole Attack
Proceedings of the CUBE International Information Technology Conference
Testing of precision agricultural networks for adversary-induced problems
Proceedings of the 15th annual conference on Genetic and evolutionary computation
Approximation algorithms for the antenna orientation problem
FCT'13 Proceedings of the 19th international conference on Fundamentals of Computation Theory
Journal of Computer and System Sciences
International Journal of Ad Hoc and Ubiquitous Computing
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.07 |
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.