51. Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks.
- Author
-
Naït-Abdesselam, Farid, Bensaou, Brahim, and Taleb, TarikY
- Subjects
- *
AD hoc computer networks , *WORMHOLE routing , *ROUTING (Computer network management) , *WORMHOLES (Physics) , *COMPUTER networks , *WIRELESS communications , *REMOTE access networks , *COMPUTER network protocols , *STANDARDS - Abstract
A particularly severe attack on routing protocols in ad hoc networks is the so-called worm- hole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for replay at that remote location. When this attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. In the optimized link state routing protocol, if a wormhole attack is launched during the propagation of link state packets, the wrong link information percolates throughout the network, leading to routing disruption. In this article we devise an efficient method to detect and avoid wormhole attacks in the OLSR protocol. This method first attempts to pinpoint links that may potentially be part of a wormhole tunnel. Then a proper wormhole detection mechanism is applied to suspicious links by means of an exchange of encrypted probing packets between the two supposed neighbors (endpoints of the wormhole). The proposed solution exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF