Detecting and avoiding wormhole attacks in wireless ad hoc networks

Farid Nait-Abdesselam*, Brahim Bensaou, Tarik Taleb

*Corresponding author for this work

Research output: Contribution to journalJournal Articlepeer-review

Abstract

A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for replay at that remote location. When this attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. In the optimized link state routing protocol, if a wormhole attack is launched during the propagation of link state packets, the wrong link information percolates throughout the network, leading to routing disruption. In this article we devise an efficient method to detect and avoid wormhole attacks in the OLSR protocol. This method first attempts to pinpoint links that may potentially be part of a wormhole tunnel. Then a proper wormhole detection mechanism is applied to suspicious links by means of an exchange of encrypted probing packets between the two supposed neighbors (endpoints of the wormhole). The proposed solution exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios.

Original languageEnglish
Pages (from-to)127-133
Number of pages7
JournalIEEE Communications Magazine
Volume46
Issue number4
DOIs
Publication statusPublished - Apr 2008

Fingerprint

Dive into the research topics of 'Detecting and avoiding wormhole attacks in wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this