作者: Yih-Chun Hu , A. Perrig , D.B. Johnson
关键词: Wormhole 、 Network topology 、 Wireless lan 、 Routing protocol 、 Computer science 、 Mobile ad hoc network 、 Wireless network 、 Network security 、 Wireless security 、 Computer security 、 Network packet 、 Wireless ad hoc network 、 Computer network
摘要: As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, severe attack in networks that is particularly challenging to defend against. The possible even if attacker has not compromised any hosts, and all communication provides authenticity confidentiality. an records packets (or bits) at one location network, tunnels them (possibly selectively) another location, retransmits there into network. can form serious threat wireless networks, especially against many routing protocols location-based systems. For example, most existing protocols, without some mechanism would be unable find routes longer than or two hops, severely disrupting communication. We present general mechanism, called packet leashes, for detecting and, thus defending attacks, specific protocol, TIK, implements leashes. also discuss topology-based detection, show it impossible these approaches detect topologies.