• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks (2003)

Cached

  • Download as a PDF

Download Links

  • [www.cs.rice.edu]
  • [www-cgi.cs.cmu.edu]
  • [www.cs.cmu.edu]
  • [nas.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [www.cs.rice.edu]
  • [nas.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]
  • [monarch.cs.rice.edu]
  • [www.ieee-infocom.org]
  • [www.cs.jhu.edu]
  • [www.cs.huji.ac.il]
  • [www.monarch.cs.cmu.edu]
  • [monarch.cs.rice.edu]
  • [monarch.cs.cmu.edu]
  • [www.monarch.cs.rice.edu]
  • [www.cs.jhu.edu]
  • [infocom2003.ieee-infocom.org]
  • [www.monarch.cs.cmu.edu]
  • [www.cs.rice.edu]
  • [monarch.cs.cmu.edu]
  • [www-cgi.cs.cmu.edu]
  • [www.monarch.cs.rice.edu]
  • [www.crhc.uiuc.edu]
  • [www.cs.cmu.edu]
  • [monarch.cs.rice.edu]
  • [users.crhc.illinois.edu]
  • [www.cse.sc.edu]
  • [www.cs.rice.edu]
  • [www.monarch.cs.cmu.edu]
  • [monarch.cs.cmu.edu]
  • [www.monarch.cs.rice.edu]
  • [www.crhc.uiuc.edu]
  • [monarch.cs.rice.edu]
  • [users.crhc.illinois.edu]
  • [www.ece.cmu.edu]
  • [www.ece.cmu.edu]
  • [sparrow.ece.cmu.edu]
  • [sparrow.ece.cmu.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Yih-chun Hu
Citations:703 - 15 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Hu03packetleashes:,
    author = {Yih-chun Hu},
    title = {Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks},
    booktitle = {},
    year = {2003}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract — As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. I.

Keyphrases

wormhole attack    packet leash    wireless ad hoc network    central requirement    security emerges    specific protocol    implement leash    ad hoc network    severe attack    general mechanism    serious threat    mobile ad hoc network application    many ad hoc network    existing ad hoc network    wireless network    location-based wireless security system    attacker record packet   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University