Abstract
Wormhole attack is a type of replay attack in wireless networks that has serious consequences and is hard to defend against. This is because the attacker does not need to modify packets or compromise wireless nodes. This paper introduces Wormeros, a new framework to detect wormhole attacks in wireless networks. The framework contains two phases namely suspicion and confirmation. Our solution does not require any special hardware (such as GPS) or expensive mechanisms (such as time synchronization) added to the wireless nodes. Using analysis and simulation, we show that our solution is effective in detecting and defending against wormhole attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: Proceedings of IEEE InfoCom. (April 2003)
Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: Network and Distributed System Security Symposium (February 2003)
Ko, Y.B., Shankarkumar, V., Vaidya, N.: Medium access control protocols using directional antennas in ad hoc networks. In: Proceedings of IEEE InfoCom., pp. 13–21 (March 2000)
Čapkun, S., Buttyán, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32 (October 2003)
Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack in wireless networks. In: Proceedings of IEEE ICNP, pp. 75–84 (November 2006)
Khalil, I.: LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In: Proceedings of IEEE DSN, pp. 612–621 (June 2005)
Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information. In: Proceedings of IEEE InfoCom. (May 2007)
Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st International Symposium on Wireless Pervasive Computing (January 2006)
Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks. In: 4th IEEE Consumer Communications and Networking Conference (January 2007)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS, pp. 41–47 (November 2002)
The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vu, H., Kulkarni, A., Sarac, K., Mittal, N. (2008). WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks. In: Li, Y., Huynh, D.T., Das, S.K., Du, DZ. (eds) Wireless Algorithms, Systems, and Applications. WASA 2008. Lecture Notes in Computer Science, vol 5258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88582-5_46
Download citation
DOI: https://doi.org/10.1007/978-3-540-88582-5_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88581-8
Online ISBN: 978-3-540-88582-5
eBook Packages: Computer ScienceComputer Science (R0)