Online citations, reference lists, and bibliographies.
← Back to Search

Packet Leashes: A Defense Against Wormhole Attacks In Wireless Networks

Y. Hu, A. Perrig, D. Johnson
Published 2003 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy Visualize in Litmaps
Share
Reduce the time it takes to create your bibliography by a factor of 10 by using the world’s favourite reference manager
Time to take this seriously.
Get Citationsy
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.
This paper references
10.1109/AFIPS.1970.138
The ALOHA System-Another Alternative for Computer Communications
N. Abramson (1899)
A Meth od for Obtaining Digital Signatures and Public-Key Cryptosystem s
Ron L. Rivest (1978)
10.1109/SP.1980.10006
Protocols for Public Key Cryptosystems
R. Merkle (1980)
10.1145/358790.358797
Password authentication with insecure communication
L. Lamport (1981)
Lenstra and Eric R . Verheul . Selecting Cryptographic Key Sizes
K Arjen (1981)
Password Authentication with Insecur e Communication
Leslie Lamport (1981)
10.1109/TCOM.1982.1095533
Theory of Spread-Spectrum Communications - A Tutorial
Raymond L. Pickholtz (1982)
10.1145/357980.358017
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1978)
10.1145/6490.6503
How to construct random functions
Oded Goldreich (1986)
10.1109/CSAC.1990.143746
A security analysis of the NTP protocol version 2
M. Bishop (1990)
and Stephen T . Kent . Securing the Nimrod Routing Architecture
Karen E. Sirois (1991)
10.1007/3-540-48285-7_30
Distance-Bounding Protocols (Extended Abstract)
S. Brands (1994)
Workshop on the theory and application of cryptographic techniques on Advances in cryptology
T. Helleseth (1994)
10.1145/190314.190336
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
C. Perkins (1994)
Highly Dynamic D estination- Sequenced Distance-Vector Routing (DSDV) for Mobile Compu ters
Charles E. Perkins (1994)
Distance-Bounding Proto cols. In Workshop on the theory and application of cryptographic tec hniques on Advances in cryptology (CRYPTO 1994
Stefan Brands (1994)
10.17487/RFC1760
The S/KEY One-Time Password System
N. Haller (1995)
10.1145/217382.217414
Performance analysis of MD5
J. Touch (1995)
10.1201/9781439821916
Handbook of Applied Cryptography
A. Menezes (1996)
10.1007/3-540-68697-5_1
Keying Hash Functions for Message Authentication
M. Bellare (1996)
Lecture Notes on Cryptography. Summer Course " Cryptography and Computer Security " at MIT
Shafi Goldwasser (1996)
Lecture Notes on Cry ptography. Summer Course “Cryptography and Computer Security
Shafi Goldwasser (1996)
10.1109/NDSS.1997.579223
Securing the Nimrod routing architecture
Karen E. Sirois (1997)
10.1109/ieeestd.2016.7786995
Wireless lan medium access control (mac) and physical layer (phy) specifications
A. Abdullah (1997)
Maltz , and Josh Broch . The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
David B. Johnson (1997)
A Computer-Controlled LORAN-C Receiver for Precision Timekeeping
D. Mills (1998)
10.1145/288090.288121
How to prove where you are: tracking the location of customer equipment
E. Gabber (1998)
How to Prove Where You Are
E. Gabber (1998)
Symbol Technologies , Inc. Automates System-To-Gates Design Flow For Wireless LAN ASI C with COSSAP and Behavioral Compiler. Mountain View, Califo rnia
Dean Kawaguchi (1998)
Symbol Technologies, Inc. Automates System-To-Gates Design Flow For Wireless LAN ASIC with COSSAP and Behavioral Compiler. Mountain View, California
Dean Kawaguchi (1998)
Major Security Problems with the " Unforgeable " (Feige- )Fiat-Shamir Proofs of Identity and How to Overcome Them
Y Desmedt (1998)
10.1109/65.806983
Securing ad hoc networks
Lidong Zhou (1999)
10.1109/MCSA.1999.749281
Ad-hoc on-demand distance vector routing
C. Perkins (1999)
10.1007/10720107_24
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
F. Stajano (1999)
10.1109/INFCOM.1999.751457
Multicast security: a taxonomy and some efficient constructions
R. Canetti (1999)
10.1109/INFCOM.1999.749266
A reliable, efficient topology broadcast protocol for dynamic networks
B. R. Bellur (1999)
Next Century Challenges: Mobile Networking for Smart Dust
D. Estrin (1999)
The Resurrecting Duck ling: Security Issues for Ad-hoc Wireless Networks
Frank Stajano (1999)
Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks
A. Qayyum (2000)
PGP in Constrained Wireless Devices
Michael Brown (2000)
10.1007/978-3-540-46588-1_30
Selecting Cryptographic Key Sizes
A. K. Lenstra (2000)
10.1109/SECPRI.2000.848446
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig (2000)
Multip oint Relaying: An Efficient Technique for flooding in Mobile Wireless Networ ks
Amir Qayyum (2000)
PGP in Constrained Wireless Devices Proceedings of the 9th USENIX Security Symposium
Michael Brown (2000)
Frequently Asked Questions v4 for BAA 01-01, FCS Communications Technology
(2000)
fficient Authentication and Signature of Multicast Streams over Los sy Channels
Adrian Perrig (2000)
10.1109/ICNP.2001.992905
Providing robust and ubiquitous security support for mobile ad-hoc networks
J. Kong (2001)
Lecture Notes on Cryptography
S. Goldwasser (2001)
10.1145/501436.501437
The quest for security in mobile ad hoc networks
J. Hubaux (2001)
DSR: the dynamic source routing protocol for multihop wireless ad hoc networks
D. Johnson (2001)
The Dyn amic Source Routing Protocol for Multihop Wireless Ad Hoc Networ ks
David B. Johnson (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip. Press Release 6-04-01, Elstree, United Kingdom. Available at http://www.arccores
ARC International (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip. Press Release 6-04-01, Elstree, United Kingdom
ARC International (2001)
ARC releases BlueForm, a comprehens iv solution for Bluetooth systems on a chip. Press Release 6-04-0 1, Elstree, United Kingdom. Available at http://www.arccores
ARC International (2001)
Selecting Cryptographic Key Sizes Journal of Cryptology: The Journal of the International Association for Cryptologic Research
K Arjen (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip Press Release 6-04-01, Elstree, United Kingdom. Available at http://www.arccores. com/newsevents
Arc International (2001)
Selecting Cryptog raphic Key Sizes
Arjen K. Lenstra (2001)
ARC releases BlueForm, a comprehensive solution for Bluetooth systems on a chip. Press Release 6-04-01
ARC International (2001)
10.1145/570645.570647
Zero-interaction authentication
Mark D. Corner (2002)
10.1109/MCSA.2002.1017481
Context authentication using constrained channels
T. Kindberg (2002)
Zero-Interaction Authent ica ion
Mark Corner (2002)
IEEE IEEE INFOCOM
(2003)
10.1007/BF00196725
Efficient signature generation by smart cards
C. Schnorr (2004)
Security for Sensor Networks
Sasikanth Avancha (2004)
A Precision Radio Clock for WWV Transmissions
D. Mills (2004)
10.1007/978-3-540-32004-3_5
Securing Ad Hoc Networks
Panos Papadimitratos (2005)
Major Security Problems with the “ Unforgeable ” ( Feige - ) Fiat - Shamir Proofs of Identity and How to Overcome Them
Oded Goldreich
Touch . Performance Analysis of MD 5
D Joseph
Data Sheet and Specifications for Trimble Thunderbolt GPS Disciplined Clock
Trimble Navigation
Specification sheet for ORiNOCO World PC Card. Allentown, PA. Available at ftp://ftp.orinocowireless. com/pub/docs
Agere Systems
Data sheet for Proxim Harmony 802.11a CardBus Card
Inc Proxim
Tom Clark's Totally Accurate Clock FTP Site Available at ftp
Tom Clark
CS294-8 Deeply Networked Systems Mote Documentation and Development Information
Alec Woo
@BULLET Graphics borrowed from http://www.panda.uvic.ca/seminars/stor age/PacketLeashes.ppt, http://www.ece.cmu.edu/~adrian/project s/ secure-routing/infocom2003.pdf CS577: Advanced Computer Networks
High Performance Solutions in Silicon — MD5 Core
Helion Technology
Touch . Performance Analysis of MD 5
Lidong Zhou
A→B: (RTS, HMACKi (M)) B→A: (CTS) A→B: (DATA, M, tree values
and Elizabeth M . Royer . Ad - Hoc On - Demand Distance Vector Routing Efficient Authentication and Signature of Multicast Streams over Lossy Channels
Adrian Perrig



This paper is referenced by
10.3390/APP11073176
Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem
Nuno Torres (2021)
Control-Theoretic Stabilization Framework for Wormhole Attack on Network Control System
(2021)
10.1007/s12652-020-02079-8
A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks
Sujesh Lal (2020)
10.1007/978-981-16-1307-4_4
Threats and Attacks in UWSN
P. Mahalle (2021)
10.1109/ACCESS.2021.3051491
A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
Muhannad Tahboush (2021)
10.7717/peerj-cs.517
A new secure authentication based distance bounding protocol
Ahmed Raheeq Sultan (2021)
10.1016/J.MATPR.2021.08.039
The AODV routing protocol with built-in security to counter blackhole attack in MANET
B PrabhakarReddy (2021)
10.35940/IJRTE.A5873.0510121
Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review
P. K* (2021)
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols
Shengtuo Hu (2021)
10.3390/math9162007
Dynamical Behavior Analysis of a Time-Delay SIRS-L Model in Rechargeable Wireless Sensor Networks
Guiyun Liu (2021)
10.1007/978-3-030-67369-7_6
Analysis and Performance of Topology Inference in Mobile Ad Hoc Networks
J. Brown (2021)
10.1007/978-981-16-4284-5_1
DTNMA: Identifying Routing Attacks in Delay-Tolerant Network
(2021)
10.1007/978-3-030-73603-3_20
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge
H. Zougagh (2021)
SWANS: SDN-based Wormhole Analysis using the Neighbor Similarity for a Mobile ad hoc network (MANET)
Faheed A. F. Alenezi (2021)
10.1109/TIFS.2020.3013093
Flow Misleading: Worm-Hole Attack in Software-Defined Networking via Building In-Band Covert Channel
Jingyu Hua (2021)
10.3390/electronics10192365
A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues
Gaurav Sharma (2021)
10.1007/s11277-021-08950-x
Intelligent Ad-Hoc-On Demand Multipath Distance Vector for Wormhole Attack in Clustered WSN
Surinder Singh (2021)
10.4018/978-1-7998-5348-0.ch017
Security in IoT Devices
N. Jeyanthi (2021)
10.35940/ijdcn.c5016.081421
Challenges in Sinkhole Attack Detection in Wireless Sensor Network
Dr. Akhilesh A. Waoo (2021)
10.22247/ijcna/2021/209705
Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
Ga-Hyeon An (2021)
10.11591/csit.v2i1.p33-42
Survey of wormhole attack in wireless sensor networks
Umashankar Ghugar (2021)
10.1002/cpe.5017
Modified secure AODV protocol to prevent wormhole attack in MANET
S. S. Narayanan (2018)
10.3390/s20092495
A Review of IoT Sensing Applications and Challenges Using RFID and Wireless Sensor Networks
H. Landaluce (2020)
10.1109/JIOT.2020.2985324
Secure and Efficient Data Sharing in Dynamic Vehicular Networks
Jian Shen (2020)
10.1007/978-981-15-8053-6_6
Inter-Vehicle Communication and Cyber Security
Shiho Kim (2020)
10.1109/SMART50582.2020.9336794
Wormhole Formation and Simulation in Dynamic Source Routing Protocol using NS3
Nisha Sharma (2020)
Anticipation of Wormhole Attacks by Selective Routing in Wireless Sensor Networks
D. Nanthiya (2020)
10.1109/MASS50613.2020.00039
Towards Secure and Scalable UWB-based Positioning Systems
Michael Stocker (2020)
10.1016/j.iot.2020.100264
A survey of IoT protocols and their security issues through the lens of a generic IoT stack
Jonathan Tournier (2020)
10.1109/SP40000.2020.00010
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
Patrick Leu (2019)
10.1109/COMST.2019.2953364
Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
I. Butun (2019)
10.1007/S00779-019-01220-5
Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use
Jacob T. Biehl (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar