Skip to main content

WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5258))

Abstract

Wormhole attack is a type of replay attack in wireless networks that has serious consequences and is hard to defend against. This is because the attacker does not need to modify packets or compromise wireless nodes. This paper introduces Wormeros, a new framework to detect wormhole attacks in wireless networks. The framework contains two phases namely suspicion and confirmation. Our solution does not require any special hardware (such as GPS) or expensive mechanisms (such as time synchronization) added to the wireless nodes. Using analysis and simulation, we show that our solution is effective in detecting and defending against wormhole attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: Proceedings of IEEE InfoCom. (April 2003)

    Google Scholar 

  2. Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: Network and Distributed System Security Symposium (February 2003)

    Google Scholar 

  3. Ko, Y.B., Shankarkumar, V., Vaidya, N.: Medium access control protocols using directional antennas in ad hoc networks. In: Proceedings of IEEE InfoCom., pp. 13–21 (March 2000)

    Google Scholar 

  4. Čapkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32 (October 2003)

    Google Scholar 

  5. Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack in wireless networks. In: Proceedings of IEEE ICNP, pp. 75–84 (November 2006)

    Google Scholar 

  6. Khalil, I.: LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In: Proceedings of IEEE DSN, pp. 612–621 (June 2005)

    Google Scholar 

  7. Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: Proceedings of IEEE InfoCom. (May 2007)

    Google Scholar 

  8. Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st International Symposium on Wireless Pervasive Computing (January 2006)

    Google Scholar 

  9. Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. In: 4th IEEE Consumer Communications and Networking Conference (January 2007)

    Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS, pp. 41–47 (November 2002)

    Google Scholar 

  11. The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vu, H., Kulkarni, A., Sarac, K., Mittal, N. (2008). WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks. In: Li, Y., Huynh, D.T., Das, S.K., Du, DZ. (eds) Wireless Algorithms, Systems, and Applications. WASA 2008. Lecture Notes in Computer Science, vol 5258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88582-5_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88582-5_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88581-8

  • Online ISBN: 978-3-540-88582-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics