Title :
In-Band Wormholes and Countermeasures in OLSR Networks
Author :
Kruus, Peter ; Sterne, Dan ; Gopaul, Richard ; Heyman, Michael ; Rivera, Brian ; Budulas, Peter ; Luu, Brian ; Johnson, Tommy ; Ivanic, Natalie ; Lawler, Geoff
fDate :
Aug. 28 2006-Sept. 1 2006
Abstract :
In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness
Keywords :
ad hoc networks; mobile radio; telecommunication network routing; telecommunication network topology; telecommunication security; telecommunication traffic; MANET; OLSR networks; colluding nodes; in-band wormholes; multi-hop tunnels; network capacity; packet delays; packet loss rates; shortest-path routing calculations; topological characteristics; wormhole attack; wormhole gravitational analysis; Collaboration; Communication system traffic control; Degradation; Government; Hardware; Laboratories; Mobile ad hoc networks; Mobile communication; Radio frequency; Routing protocols; Computer network security; mobile communications; reachability analysis; routing; wormhole;
Conference_Titel :
Securecomm and Workshops, 2006
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0423-1
Electronic_ISBN :
1-4244-0423-1
DOI :
10.1109/SECCOMW.2006.359551