Review of Existing Wormhole Attack Discovery Techniques

PDF

Authors
  1. Gorlatova, M.A.
Corporate Authors
Defence R&D Canada - Ottawa, Ottawa ONT (CAN);Ottawa Univ, Ottawa ONT (CAN) School of Information Technology and Engineering
Abstract
In this report, we describe a severe Mobile Ad Hoc Network (MANET) routing attack called a wormhole attack and review state-of-the-art ways to thwart wormhole attacks. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to believe they are neighbours and making them communicate through the wormhole link. Unlike many other attacks on ad hoc routing,a wormhole attack can not be prevented with cryptographic solutions because intruders neither generate new, nor modify existing, packets, but rather forward existing ones.

Il y a un résumé en français ici.

Report Number
DRDC-OTTAWA-CR-2006-165 — Contractor Report
Date of publication
01 Jul 2006
Number of Pages
32
DSTKIM No
CA028452
CANDIS No
526628
Format(s):
CD ROM

Permanent link

Document 1 of 1

Date modified: