Wormhole attacks in wireless networks

作者: Yih-Chun Hu , A. Perrig , D.B. Johnson

DOI: 10.1109/JSAC.2005.861394

关键词: WormholeNetwork topologyWireless lanRouting protocolComputer scienceMobile ad hoc networkWireless networkNetwork securityWireless securityComputer securityNetwork packetWireless ad hoc networkComputer network

摘要: As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, severe attack in networks that is particularly challenging to defend against. The possible even if attacker has not compromised any hosts, and all communication provides authenticity confidentiality. an records packets (or bits) at one location network, tunnels them (possibly selectively) another location, retransmits there into network. can form serious threat wireless networks, especially against many routing protocols location-based systems. For example, most existing protocols, without some mechanism would be unable find routes longer than or two hops, severely disrupting communication. We present general mechanism, called packet leashes, for detecting and, thus defending attacks, specific protocol, TIK, implements leashes. also discuss topology-based detection, show it impossible these approaches detect topologies.

参考文章(32)
Shafi Goldwasser, Mihir Bellare, Lecture Notes on Cryptography ,(2001)
Laurent Viennot, Amir Qayyum, Anis Laouiti, Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks INRIA. ,(2000)
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Lingxuan Hu, David Evans, Using Directional Antennas to Prevent Wormhole Attacks. network and distributed system security symposium. ,(2004)
Svenja Knappe, Vishal Shah, Peter D. D. Schwindt, Leo Hollberg, John Kitching, Li-Anne Liew, John Moreland, A microfabricated atomic clock Applied Physics Letters. ,vol. 85, pp. 1460- 1462 ,(2004) , 10.1063/1.1787942
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
David A. Maltz, David B. Johnson, Josh Broch, DSR: the dynamic source routing protocol for multihop wireless ad hoc networks Ad hoc networking. pp. 139- 172 ,(2001)
J. M. Kahn, R. H. Katz, K. S. J. Pister, Next century challenges: mobile networking for “Smart Dust” acm/ieee international conference on mobile computing and networking. pp. 271- 278 ,(1999) , 10.1145/313451.313558