Online citations, reference lists, and bibliographies.
← Back to Search

Packet Leashes: A Defense Against Wormhole Attacks In Wireless Networks

Y. Hu, A. Perrig, D. Johnson
Published 2003 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy Visualize in Litmaps
Reduce the time it takes to create your bibliography by a factor of 10 by using the world’s favourite reference manager
Time to take this seriously.
Get Citationsy
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.
This paper references
The ALOHA System-Another Alternative for Computer Communications
N. Abramson (1899)
A Meth od for Obtaining Digital Signatures and Public-Key Cryptosystem s
Ron L. Rivest (1978)
Protocols for Public Key Cryptosystems
R. Merkle (1980)
Password authentication with insecure communication
L. Lamport (1981)
Lenstra and Eric R . Verheul . Selecting Cryptographic Key Sizes
K Arjen (1981)
Password Authentication with Insecur e Communication
Leslie Lamport (1981)
Theory of Spread-Spectrum Communications - A Tutorial
Raymond L. Pickholtz (1982)
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1978)
How to construct random functions
Oded Goldreich (1986)
A security analysis of the NTP protocol version 2
M. Bishop (1990)
and Stephen T . Kent . Securing the Nimrod Routing Architecture
Karen E. Sirois (1991)
Distance-Bounding Protocols (Extended Abstract)
S. Brands (1994)
Workshop on the theory and application of cryptographic techniques on Advances in cryptology
T. Helleseth (1994)
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
C. Perkins (1994)
Highly Dynamic D estination- Sequenced Distance-Vector Routing (DSDV) for Mobile Compu ters
Charles E. Perkins (1994)
Distance-Bounding Proto cols. In Workshop on the theory and application of cryptographic tec hniques on Advances in cryptology (CRYPTO 1994
Stefan Brands (1994)
The S/KEY One-Time Password System
N. Haller (1995)
Performance analysis of MD5
J. Touch (1995)
Handbook of Applied Cryptography
A. Menezes (1996)
Keying Hash Functions for Message Authentication
M. Bellare (1996)
Lecture Notes on Cryptography. Summer Course " Cryptography and Computer Security " at MIT
Shafi Goldwasser (1996)
Lecture Notes on Cry ptography. Summer Course “Cryptography and Computer Security
Shafi Goldwasser (1996)
Securing the Nimrod routing architecture
Karen E. Sirois (1997)
Wireless lan medium access control (mac) and physical layer (phy) specifications
A. Abdullah (1997)
Maltz , and Josh Broch . The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
David B. Johnson (1997)
A Computer-Controlled LORAN-C Receiver for Precision Timekeeping
D. Mills (1998)
How to prove where you are: tracking the location of customer equipment
E. Gabber (1998)
How to Prove Where You Are
E. Gabber (1998)
Symbol Technologies , Inc. Automates System-To-Gates Design Flow For Wireless LAN ASI C with COSSAP and Behavioral Compiler. Mountain View, Califo rnia
Dean Kawaguchi (1998)
Symbol Technologies, Inc. Automates System-To-Gates Design Flow For Wireless LAN ASIC with COSSAP and Behavioral Compiler. Mountain View, California
Dean Kawaguchi (1998)
Major Security Problems with the " Unforgeable " (Feige- )Fiat-Shamir Proofs of Identity and How to Overcome Them
Y Desmedt (1998)
Securing ad hoc networks
Lidong Zhou (1999)
Ad-hoc on-demand distance vector routing
C. Perkins (1999)
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
F. Stajano (1999)
Multicast security: a taxonomy and some efficient constructions
R. Canetti (1999)
A reliable, efficient topology broadcast protocol for dynamic networks
B. R. Bellur (1999)
Next Century Challenges: Mobile Networking for Smart Dust
D. Estrin (1999)
The Resurrecting Duck ling: Security Issues for Ad-hoc Wireless Networks
Frank Stajano (1999)
Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks
A. Qayyum (2000)
PGP in Constrained Wireless Devices
Michael Brown (2000)
Selecting Cryptographic Key Sizes
A. K. Lenstra (2000)
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig (2000)
Multip oint Relaying: An Efficient Technique for flooding in Mobile Wireless Networ ks
Amir Qayyum (2000)
PGP in Constrained Wireless Devices Proceedings of the 9th USENIX Security Symposium
Michael Brown (2000)
Frequently Asked Questions v4 for BAA 01-01, FCS Communications Technology
fficient Authentication and Signature of Multicast Streams over Los sy Channels
Adrian Perrig (2000)
Providing robust and ubiquitous security support for mobile ad-hoc networks
J. Kong (2001)
Lecture Notes on Cryptography
S. Goldwasser (2001)
The quest for security in mobile ad hoc networks
J. Hubaux (2001)
DSR: the dynamic source routing protocol for multihop wireless ad hoc networks
D. Johnson (2001)
The Dyn amic Source Routing Protocol for Multihop Wireless Ad Hoc Networ ks
David B. Johnson (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip. Press Release 6-04-01, Elstree, United Kingdom. Available at http://www.arccores
ARC International (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip. Press Release 6-04-01, Elstree, United Kingdom
ARC International (2001)
ARC releases BlueForm, a comprehens iv solution for Bluetooth systems on a chip. Press Release 6-04-0 1, Elstree, United Kingdom. Available at http://www.arccores
ARC International (2001)
Selecting Cryptographic Key Sizes Journal of Cryptology: The Journal of the International Association for Cryptologic Research
K Arjen (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip Press Release 6-04-01, Elstree, United Kingdom. Available at http://www.arccores. com/newsevents
Arc International (2001)
Selecting Cryptog raphic Key Sizes
Arjen K. Lenstra (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip. Press Release 6-04-01
ARC International (2001)
Zero-interaction authentication
Mark D. Corner (2002)
Context authentication using constrained channels
T. Kindberg (2002)
Zero-Interaction Authent ica ion
Mark Corner (2002)
Efficient signature generation by smart cards
C. Schnorr (2004)
Security for Sensor Networks
Sasikanth Avancha (2004)
A Precision Radio Clock for WWV Transmissions
D. Mills (2004)
Securing Ad Hoc Networks
Panos Papadimitratos (2005)
Major Security Problems with the “ Unforgeable ” ( Feige - ) Fiat - Shamir Proofs of Identity and How to Overcome Them
Oded Goldreich
Touch . Performance Analysis of MD 5
D Joseph
Data Sheet and Specifications for Trimble Thunderbolt GPS Disciplined Clock
Trimble Navigation
Specification sheet for ORiNOCO World PC Card. Allentown, PA. Available at ftp://ftp.orinocowireless. com/pub/docs
Agere Systems
Data sheet for Proxim Harmony 802.11a CardBus Card
Inc Proxim
Tom Clark's Totally Accurate Clock FTP Site Available at ftp
Tom Clark
CS294-8 Deeply Networked Systems Mote Documentation and Development Information
Alec Woo
@BULLET Graphics borrowed from age/PacketLeashes.ppt, s/ secure-routing/infocom2003.pdf CS577: Advanced Computer Networks
High Performance Solutions in Silicon — MD5 Core
Helion Technology
Touch . Performance Analysis of MD 5
Lidong Zhou
A→B: (RTS, HMACKi (M)) B→A: (CTS) A→B: (DATA, M, tree values
and Elizabeth M . Royer . Ad - Hoc On - Demand Distance Vector Routing Efficient Authentication and Signature of Multicast Streams over Lossy Channels
Adrian Perrig

This paper is referenced by
Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem
Nuno Torres (2021)
Control-Theoretic Stabilization Framework for Wormhole Attack on Network Control System
A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks
Sujesh Lal (2020)
Threats and Attacks in UWSN
P. Mahalle (2021)
A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
Muhannad Tahboush (2021)
A new secure authentication based distance bounding protocol
Ahmed Raheeq Sultan (2021)
The AODV routing protocol with built-in security to counter blackhole attack in MANET
B PrabhakarReddy (2021)
Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review
P. K* (2021)
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols
Shengtuo Hu (2021)
Dynamical Behavior Analysis of a Time-Delay SIRS-L Model in Rechargeable Wireless Sensor Networks
Guiyun Liu (2021)
Analysis and Performance of Topology Inference in Mobile Ad Hoc Networks
J. Brown (2021)
DTNMA: Identifying Routing Attacks in Delay-Tolerant Network
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge
H. Zougagh (2021)
SWANS: SDN-based Wormhole Analysis using the Neighbor Similarity for a Mobile ad hoc network (MANET)
Faheed A. F. Alenezi (2021)
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel
Jingyu Hua (2021)
A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues
Gaurav Sharma (2021)
Intelligent Ad-Hoc-On Demand Multipath Distance Vector for Wormhole Attack in Clustered WSN
Surinder Singh (2021)
Security in IoT Devices
N. Jeyanthi (2021)
Challenges in Sinkhole Attack Detection in Wireless Sensor Network
Dr. Akhilesh A. Waoo (2021)
Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
Ga-Hyeon An (2021)
Survey of wormhole attack in wireless sensor networks
Umashankar Ghugar (2021)
Modified secure AODV protocol to prevent wormhole attack in MANET
S. S. Narayanan (2018)
A Review of IoT Sensing Applications and Challenges Using RFID and Wireless Sensor Networks
H. Landaluce (2020)
Secure and Efficient Data Sharing in Dynamic Vehicular Networks
Jian Shen (2020)
Inter-Vehicle Communication and Cyber Security
Shiho Kim (2020)
Wormhole Formation and Simulation in Dynamic Source Routing Protocol using NS3
Nisha Sharma (2020)
Anticipation of Wormhole Attacks by Selective Routing in Wireless Sensor Networks
D. Nanthiya (2020)
Towards Secure and Scalable UWB-based Positioning Systems
Michael Stocker (2020)
A survey of IoT protocols and their security issues through the lens of a generic IoT stack
Jonathan Tournier (2020)
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu (2019)
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
I. Butun (2019)
Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use
Jacob T. Biehl (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar