LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
@article{Khalil2005LITEWORPAL, title={LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks}, author={Issa M. Khalil and S. Bagchi and N. Shroff}, journal={2005 International Conference on Dependable Systems and Networks (DSN'05)}, year={2005}, pages={612-621} }
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more… Expand
Figures, Tables, and Topics from this paper
346 Citations
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
- Computer Science
- Comput. Networks
- 2007
- 105
- PDF
MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks
- Computer Science
- Ad Hoc Networks
- 2008
- 54
MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks
- Computer Science
- 2006 Securecomm and Workshops
- 2006
- 126
- PDF
A Survey Article on Wormhole Attack Detection and Security in Wireless Sensor Networks
- Computer Science
- 2017
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
- Computer Science
- Ad Hoc Networks
- 2010
- 64
- PDF
Detecting and avoiding wormhole attacks in wireless ad hoc networks
- Computer Science
- IEEE Communications Magazine
- 2008
- 148
WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
- Computer Science
- Mob. Inf. Syst.
- 2016
- 30
- PDF
References
SHOWING 1-10 OF 58 REFERENCES
Packet leashes: a defense against wormhole attacks in wireless networks
- Computer Science
- IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)
- 2003
- 1,755
- PDF
Rushing attacks and defense in wireless ad hoc network routing protocols
- Computer Science
- WiSe '03
- 2003
- 798
- PDF
Secure Routing for Mobile Ad Hoc Networks
- Computer Science
- Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
- 2007
- 185
- Highly Influential
Secure routing for mobile ad hoc networks
- Computer Science
- IEEE Communications Surveys & Tutorials
- 2005
- 874
- PDF
SECTOR: secure tracking of node encounters in multi-hop wireless networks
- Computer Science
- SASN '03
- 2003
- 515
- PDF
A pairwise key pre-distribution scheme for wireless sensor networks
- Computer Science
- CCS '03
- 2003
- 1,238
- PDF
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
- Computer Science
- Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications
- 2002
- 1,068
- PDF