2006 Securecomm and Workshops 2006
DOI: 10.1109/seccomw.2006.359551
|View full text |Cite
|
Sign up to set email alerts
|

In-Band Wormholes and Countermeasures in OLSR Networks

Abstract: In a wormhole attack, colluding nodes create connecting the purported neighbors using a covert the illusion that two remote regions of a MANET are communication mechanism. The wormhole undermines directly connected through nodes that appear to be shortest path routing calculations, allowing the attacking neighbors, but are actually distant from each other. This nodes to attract traffic from other parts of the network so it is undermines shortest-path routing calculations, allowing routed through them. The worm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 23 publications
(30 citation statements)
references
References 7 publications
0
30
0
Order By: Relevance
“…They cannot identify the intermediate tunnel nodes that knowingly or unknowingly participate in forming a wormhole tunnel. Kruus et al [9] proposed several countermeasures for wormhole detection and prevention. These countermeasures include 1) OLSR protocol extensions that incorporate link quality in routing decisions, 2) higher protocol layer measurements of packet loss and round-trip delays over 1-hop and 3-hop routing paths, and 3) monitoring for the presence of asymmetric links and other potential indicators.…”
Section: Related Workmentioning
confidence: 99%
“…They cannot identify the intermediate tunnel nodes that knowingly or unknowingly participate in forming a wormhole tunnel. Kruus et al [9] proposed several countermeasures for wormhole detection and prevention. These countermeasures include 1) OLSR protocol extensions that incorporate link quality in routing decisions, 2) higher protocol layer measurements of packet loss and round-trip delays over 1-hop and 3-hop routing paths, and 3) monitoring for the presence of asymmetric links and other potential indicators.…”
Section: Related Workmentioning
confidence: 99%
“…The research we present here builds on our prior work, which provided the first detailed description of in-band wormholes in OLSR networks [14] [11]. We introduced the terms extended wormhole for attacks in which the wormhole link appears between unsuspecting benign nodes and self-contained wormhole for attacks in which the wormhole link appears between two attacking nodes.…”
Section: Related Workmentioning
confidence: 99%
“…An in-band wormhole can fall victim to its own success, as the disruption in network routing can also affect the routing of traffic through the wormhole tunnel, causing the wormhole to collapse [14]. An inband wormhole collapses when its tunnel endpoints cannot continue to forward control messages between remote network regions.…”
Section: In-band Wormholes In Olsrmentioning
confidence: 99%
See 2 more Smart Citations