Authors
Y-C Hu, Adrian Perrig, David B Johnson
Publication date
2003/3/30
Conference
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428)
Volume
3
Pages
1976-1986
Publisher
IEEE
Description
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one …
Total citations
20022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024839641341771801801631941981971692121571421328058514543383
Scholar articles
YC Hu, A Perrig, DB Johnson - IEEE INFOCOM 2003. Twenty-second Annual Joint …, 2003