Detecting and avoiding wormhole attacks in wireless ad hoc networks

被引:51
作者
Nait-Abdesselam, Farid [1 ]
Bensaou, Brahim [2 ]
Taleb, Tarik [3 ]
机构
[1] Univ Sci & Technol Lille, Lille, France
[2] Hong Kong Univ Sci & Technol, Hong Kong, Hong Kong, Peoples R China
[3] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
关键词
Computer worms - Cryptography - Intrusion detection - Packet networks - Routing protocols - Telecommunication links;
D O I
10.1109/MCOM.2008.4481351
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for replay at that remote location. When this attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. In the optimized link state routing protocol, if a wormhole attack is launched, during the propagation of link state packets, the wrong link information percolates throughout the network, leading to routing disruption. In this article we devise an efficient method to detect and avoid wormhole attacks in the OLSR protocol. This method first attempts to pinpoint links that may potentially be part of a wormhole tunnel. Then a proper wormhole detection mechanism is applied to suspicious links by means of an exchange of encrypted probing packets between the two supposed neighbors (endpoints of the wormhole). The proposed solution exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios.
引用
收藏
页码:127 / 133
页数:7
相关论文
共 8 条
[1]  
CAPKUN S, 2003, P ACM WKSP SEC AD HO
[2]  
Evans D., 2004, P NETW DISTR SYS SEC
[3]   Wormhole attacks in wireless networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :370-380
[4]  
HU YC, 2003, P ACM WKSP WIR SEC S
[5]  
KHALIL I, 2005, P INT C DEP SYS NETW
[6]  
LAZOS L, 2005, P IEEE WCNC NEW OR L
[7]  
QIAN L, 2005, P IEEE WCNC NEW ORL
[8]   Location-based compromise-tolerant security mechanisms for wireless sensor networks [J].
Zhang, YC ;
Liu, W ;
Lou, WJ ;
Fang, YG .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :247-260