首页> 外文期刊>IEEE Journal on Selected Areas in Communications >Wormhole attacks in wireless networks
【24h】

Wormhole attacks in wireless networks

机译:无线网络中的虫洞攻击

获取原文
获取原文并翻译 | 示例
       

摘要

As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. We also discuss topology-based wormhole detection, and show that it is impossible for these approaches to detect some wormhole topologies.
机译:随着移动自组织网络应用程序的部署,安全性已成为核心要求。在本文中,我们介绍了蠕虫攻击,这是ad hoc网络中的一种严重攻击,防御起来尤其具有挑战性。即使攻击者没有破坏任何主机,并且即使所有通信都提供了真实性和机密性,蠕虫攻击也是可能的。在蠕虫攻击中,攻击者将数据包(或比特)记录在网络中的一个位置,将其(可能有选择地)通过隧道传输到另一位置,然后将其重新传输到网络中。蠕虫攻击可对无线网络构成严重威胁,尤其是针对许多自组织网络路由协议和基于位置的无线安全系统。例如,大多数现有的临时网络路由协议,如果没有某种机制来防御蠕虫攻击,将无法找到长于一跳或两跳的路由,从而严重破坏了通信。我们提出了一种称为数据包皮带的通用机制,用于检测并防御蠕虫攻击,并且我们提出了一种称为TIK的实现皮带的特定协议。我们还将讨论基于拓扑的虫洞检测,并表明这些方法不可能检测某些虫洞拓扑。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号