Stealth Attacks on Ad-Hoc Wireless Networks

@inproceedings{Jakobsson2003StealthAO,
  title={Stealth Attacks on Ad-Hoc Wireless Networks},
  author={Markus Jakobsson and Susanne Wetzel},
  year={2003}
}
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are ”stealth attacks” in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control , and suggest that it can be used… CONTINUE READING
Highly Cited
This paper has 57 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.

58 Citations

0510'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 58 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 19 references

Routing Security in Ad Hoc Networks

View 5 Excerpts
Highly Influenced

ROYER. Ad-Hoc On-Demand Distance Vector Routing.Proceedings of IEEE Workshop on Mobile Computing Systems and Applications

E.M.C.E. PERKINS
1999
View 5 Excerpts
Highly Influenced

Securing Ad-Hoc Networks. http://www.ee.cornell.edu/ ̃haas/Publications /network99.ps

L. ZHOU, Z. J. HAAS
1999
View 5 Excerpts
Highly Influenced

Security, Applications, Authentication and Cryptographyresearchgroup

I NTERNET
Security of the WEP Algorithm. http://www.isaac.cs.berkeley.edu/isaac/wepfaq.html , • 2001
View 1 Excerpt

The Performance of Query Control Schemes for the Zone Routing Protocol

Z. J. HAAS, M. R. PERLMAN
IEEE/ACM Transactions on Networking, • 2001
View 2 Excerpts

Similar Papers

Loading similar papers…