LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Timing-based localization of in-band wormhole tunnels in MANETs
Proceedings of the third ACM conference on Wireless network security
WODEM: wormhole attack defense mechanism in wireless sensor networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Hybrid intrusion detection system for wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
MPC: mitigating stealthy power control attacks in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Vehicular networks and the future of the mobile internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
THWMP: trust based secure routing for wireless mesh networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Local connectivity tests to identify wormholes in wireless networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
Review: Securing DSR against wormhole attacks in multirate ad hoc networks
Journal of Network and Computer Applications
Hi-index | 0.00 |
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each otherýs packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more than two hops away. In this paper, we present a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware. LITEWORP is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LITEWORP is applied is negligible compared to the loss encountered when the method is not applied.