LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks

@article{Khalil2005LITEWORPAL,
  title={LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks},
  author={Issa M. Khalil and S. Bagchi and N. Shroff},
  journal={2005 International Conference on Dependable Systems and Networks (DSN'05)},
  year={2005},
  pages={612-621}
}
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more… Expand
346 Citations
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
  • 105
  • PDF
MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks
  • 126
  • PDF
Defending Wormhole Attack in Wireless Ad-hoc Network
  • 8
  • PDF
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
  • 64
  • PDF
Detecting and avoiding wormhole attacks in wireless ad hoc networks
  • 148
WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
  • 30
  • PDF
A Survey on Detecting Wormhole Attack in Manet
  • 4
  • PDF
Wormhole Attack in Wireless Sensor Network
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 58 REFERENCES
Packet leashes: a defense against wormhole attacks in wireless networks
  • Y. Hu, A. Perrig, D. Johnson
  • Computer Science
  • IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)
  • 2003
  • 1,755
  • PDF
Mitigating Byzantine Attacks in Ad Hoc Wireless Networks
  • 101
  • PDF
Rushing attacks and defense in wireless ad hoc network routing protocols
  • 798
  • PDF
ARRIVE: Algorithm for Robust Routing in Volatile Environments
  • 100
  • PDF
Secure Routing for Mobile Ad Hoc Networks
  • Jing Liu, Fei Fu, Junmo Xiao, Y. Lu
  • Computer Science
  • Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
  • 2007
  • 185
  • Highly Influential
Secure routing for mobile ad hoc networks
  • 874
  • PDF
SECTOR: secure tracking of node encounters in multi-hop wireless networks
  • 515
  • PDF
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
  • Y. Hu, D. Johnson, A. Perrig
  • Computer Science
  • Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications
  • 2002
  • 1,068
  • PDF
...
1
2
3
4
5
...