Wormhole attacks in wireless networks

Yih-Chun Hu, Adrian Perrig

Research output: Contribution to journalArticle

Abstract

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.

Original languageEnglish (US)
Pages (from-to)370-379
Number of pages10
JournalIEEE Journal on Selected Areas in Communications
Volume24
Issue number2
DOIs
StatePublished - Feb 1 2006

Fingerprint

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Topology
Communication
Mobile ad hoc networks
Security systems
Tunnels
Network protocols

Keywords

  • Ad hoc networks
  • Computer network security
  • Computer networks
  • Packet leash
  • TIK
  • Tunneling
  • Wireless local area network (LAN)
  • Wormhole

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Wormhole attacks in wireless networks. / Hu, Yih-Chun; Perrig, Adrian.

In: IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, 01.02.2006, p. 370-379.

Research output: Contribution to journalArticle

@article{12f605c557744a83a15cb4e6e90659fe,
title = "Wormhole attacks in wireless networks",
abstract = "As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.",
keywords = "Ad hoc networks, Computer network security, Computer networks, Packet leash, TIK, Tunneling, Wireless local area network (LAN), Wormhole",
author = "Yih-Chun Hu and Adrian Perrig",
year = "2006",
month = "2",
day = "1",
doi = "10.1109/JSAC.2005.861394",
language = "English (US)",
volume = "24",
pages = "370--379",
journal = "IEEE Journal on Selected Areas in Communications",
issn = "0733-8716",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - Wormhole attacks in wireless networks

AU - Hu, Yih-Chun

AU - Perrig, Adrian

PY - 2006/2/1

Y1 - 2006/2/1

N2 - As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.

AB - As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.

KW - Ad hoc networks

KW - Computer network security

KW - Computer networks

KW - Packet leash

KW - TIK

KW - Tunneling

KW - Wireless local area network (LAN)

KW - Wormhole

UR - http://www.scopus.com/inward/record.url?scp=33144475784&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33144475784&partnerID=8YFLogxK

U2 - 10.1109/JSAC.2005.861394

DO - 10.1109/JSAC.2005.861394

M3 - Article

AN - SCOPUS:33144475784

VL - 24

SP - 370

EP - 379

JO - IEEE Journal on Selected Areas in Communications

JF - IEEE Journal on Selected Areas in Communications

SN - 0733-8716

IS - 2

ER -