0% found this document useful (0 votes)
29 views

Wormhole Attack in Sensor Networks: Security and Cooperation in Wireless Networks Chapter 6: Securing Neighbor Discovery

Wormhole attacks involve an adversary creating an out-of-band connection between two points in a network to tunnel packets from one point to the other. This can distort the network topology and cause routing protocols to select paths through the wormhole link, even if better routes exist elsewhere. It allows the adversary to monitor or drop traffic. Wormholes are not specific to wireless networks and can affect systems that use contactless devices like smart cards if a fast connection is created between emulated readers.

Uploaded by

VDRATNAKUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Wormhole Attack in Sensor Networks: Security and Cooperation in Wireless Networks Chapter 6: Securing Neighbor Discovery

Wormhole attacks involve an adversary creating an out-of-band connection between two points in a network to tunnel packets from one point to the other. This can distort the network topology and cause routing protocols to select paths through the wormhole link, even if better routes exist elsewhere. It allows the adversary to monitor or drop traffic. Wormholes are not specific to wireless networks and can affect systems that use contactless devices like smart cards if a fast connection is created between emulated readers.

Uploaded by

VDRATNAKUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Wormhole attack in Sensor

networks

Security and Cooperation in Wireless Networks


Chapter 6: Securing neighbor discovery
1/21
What is a wormhole?
 a wormhole is an out-of-band connection, controlled by the
adversary, between two physical locations in the network
– the adversary installs radio transceivers at both ends of the wormhole
– it transfers packets (possibly selectively) received from the network
at one end of the wormhole to the other end via the out-of-band
connection, and re-injects the packets there into the network

 notes:
– adversary’s transceivers are not regular nodes (no node is
compromised by the adversary)
– adversary doesn’t need to understand what it tunnels (e.g.,
encrypted packets can also be tunneled through the wormhole)
– it is easy to mount a wormhole and it may have devastating effects
on routing

Security and Cooperation in Wireless Networks


Chapter 6: Securing neighbor discovery
6.1 The wormhole attack 2/21
Effects of a wormhole
 at the data link layer: distorted network topology

y y y
x x x

(a) (b) (c)

y
x y x
y x

(f)
(d) (e)

 at the network layer:


– routing protocols may choose routes that contain wormhole links
• typically those routes appear to be shorter
• flooding based routing protocols (e.g., DSR, Ariadne) may not be able to discover other
routes but only through the wormhole
– adversary can then monitor traffic or drop packets (DoS)
Security and Cooperation in Wireless Networks
Chapter 6: Securing neighbor discovery
6.1 The wormhole attack 3/21
Wormholes are not specific to ad hoc networks

access control system:


gate equipped with contactless
contactless smart card reader smart card

wormhole

contactless
smart card fast
emulator connection

smart card
reader
emulator

user may be
far away from
the building

Security and Cooperation in Wireless Networks


Chapter 6: Securing neighbor discovery
6.1 The wormhole attack 4/21

You might also like