DocumentCode :
1653462
Title :
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
Author :
Eriksson, Jakob ; Krishnamurthy, Srikanth V. ; Faloutsos, Michalis
Author_Institution :
California Univ., Riverside, CA
fYear :
2006
Firstpage :
75
Lastpage :
84
Abstract :
In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed counter-measures to this attack use tight clock synchronization, specialized hardware, or overhearing, making them difficult to realize in practice. TrueLink is a timing based countermeasure to the wormhole attack. Using TrueLink, a node i can verify the existence of a direct link to an apparent neighbor, j. Verification of a link i harr j operates in two phases. In the rendezvous phase, the nodes exchange nonces alphaj and betai. This is done with tight timing constraints, within which it is impossible for attackers to forward the exchange between distant nodes. In the authentication phase, i and j transmit a signed message (alphaj,betai), mutually authenticating themselves as the originator of their respective nonce. TrueLink does not rely on precise clock synchronization, GPS coordinates, overhearing, geometric inconsistencies, or statistical methods. It can be implemented using only standard IEEE 802.11 hardware with a minor backwards compatible firmware update. TrueLink is meant to be used together with a secure routing protocol. Such protocols require an authentication mechanism, which will also be used by TrueLink. TrueLink is virtually independent of the routing protocol used. Our performance evaluation shows that TrueLink provides effective protection against potentially devastating wormhole attacks.
Keywords :
message authentication; routing protocols; synchronisation; telecommunication security; wireless LAN; IEEE 802.11 network; TrueLink timing based countermeasure; authentication mechanism; firmware update; rendezvous phase; secure routing protocol; signed message transmission; tight clock synchronization; virtual link; wireless network; wormhole attack; Authentication; Clocks; Global Positioning System; Hardware; Microprogramming; Routing protocols; Statistical analysis; Synchronization; Timing; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Protocols, 2006. ICNP '06. Proceedings of the 2006 14th IEEE International Conference on
Conference_Location :
Santa Barbara, CA
Print_ISBN :
1-4244-0593-9
Electronic_ISBN :
1-4244-0594-7
Type :
conf
DOI :
10.1109/ICNP.2006.320200
Filename :
4110280
Link To Document :
بازگشت