TY - JOUR
T1 - Wormhole attacks in wireless networks
AU - Hu, Yih Chun
AU - Perrig, Adrian
N1 - Funding Information:
Manuscript received October 11, 2004; revised August 15, 2005. This work was supported in part by the National Science Foundation (NSF) under Grant CCR-0209204, in part by NASA under Grant NAG3-2534, and in part by Schlumberger and Bosch. The views and conclusions contained here are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either express or implied, of NSF, NASA, Schlumberger, Bosch, The University of Illinois, Carnegie Mellon University, Rice University, or the U.S. Government or any of its agencies. This paper was presented in part at the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 3, 2003, San Francisco, CA Y.-C. Hu is with the Department of Electrical and Computer Engineering, University of Illinois at Urbana–Champaign, Urbana, IL 61801 USA (e-mail: [email protected]).
PY - 2006/2
Y1 - 2006/2
N2 - As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.
AB - As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.
KW - Ad hoc networks
KW - Computer network security
KW - Computer networks
KW - Packet leash
KW - TIK
KW - Tunneling
KW - Wireless local area network (LAN)
KW - Wormhole
UR - http://www.scopus.com/inward/record.url?scp=33144475784&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33144475784&partnerID=8YFLogxK
U2 - 10.1109/JSAC.2005.861394
DO - 10.1109/JSAC.2005.861394
M3 - Article
AN - SCOPUS:33144475784
SN - 0733-8716
VL - 24
SP - 370
EP - 379
JO - IEEE Journal on Selected Areas in Communications
JF - IEEE Journal on Selected Areas in Communications
IS - 2
ER -