wormhole DSR - The 8th IFIP Annual Mediterranean Ad Hoc...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Preventing Layer-3 Wormhole Attacks in Ad-hoc Networks with Multipath DSR Luis Fernando Garcia and Jean-Marc Robert ´ Ecole de technologie sup´erieure D´epartement de g´enie logiciel et des TI Montr´eal, Qu´ebec, Canada Email:jean-marc.robert@etsmtl.ca Abstract —Wormhole attacks in ad-hoc networks have been attracting much attention over the years. They consist in two malicious nodes tunneling trafFc from one end of the network to the other. Several approaches are proposed to detect these attacks but only few solutions exploit the information provided by multipath routing schemes. A new approach detecting wormhole attacks is presented in this paper. The Witness Integration Mul- tipath protocol is based on the multipath DSR routing protocol and Fnds suspicious behaviour related to wormhole attacks. It does not require any major protocol modiFcation nor as much cryptographic processing as the previous solutions. Index Terms —MANET, source routing, multipaths, wormholes. I. INTRODUCTION Mobile ad-hoc networks have been an attractive feld o± research ±or many years now. Due to their characteristics, these networks are an excellent choice ±or emergency operations, vehicular communication and short-live networks. Ad-hoc networks must deal with threats ±rom external agents and compromised internal nodes. The lack o± a central control and the ±act that each node must ±orward packets o± other nodes represent major security challenges. In such environments, it is di±fcult to assure the confdentiality and the integrity o± the communications as well as the availability o± the services. In this paper, we ±ocus on the wormhole attacks. In these attacks, two malicious nodes tunnel tra±fc ±rom one end o± the network to the other end using an out-band link. Their main goal is to attract tra±fc to drop, alter or, simply, look at the packets later on. Due to the characteristics o± the wormhole attacks, cryp- tographic solutions are not su±fcient. Numerous physical ap- proaches have been proposed to secure the neighbour discov- ery process . Most o± the solutions presented so ±ar require that the nodes handle in±ormation about sel±-location, per±orm clocks synchronization or rely on specialized antennas or on in±ormation such as trust relationship. Only ±ew solutions have been proposed to secure the overall end-to-end route discovery process . In this paper, we propose a new approach based on a mul- tipath source routing protocol to prevent and detect potential Layer-3 wormhole attacks. The Witness Integration Multipath DSR (WIM-DSR) solution relies on the in±ormation provided by the routing protocol to determine i± there are some typical inconsistencies associated usually to wormhole attacks. This solution does not require any cryptographic processing by the intermediate nodes i± no incoherency has been discovered (i.e. no attack takes place). This point represents the main advantages over the previous solutions.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

wormhole DSR - The 8th IFIP Annual Mediterranean Ad Hoc...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online