Proceedings ArticleDOI
Wormhole attacks in wireless adhoc networks and their counter measurements: A survey
Preeti Nagrath,Bhawna Gupta +1 more
- Vol. 6, pp 245-250
TLDR
The modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then the solutions and countermeasures on wormholes are discussed.Abstract:
A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Their biggest advantage is also one of their biggest disadvantages: Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. The entire routing system in MANET can even be brought down using the wormhole attack. This paper discusses the modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then discusses the solutions and countermeasures on wormholes.read more
Citations
More filters
Journal ArticleDOI
Securing the Internet of Things: Challenges, threats and solutions
TL;DR: This paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures, and identifies the suitable countermeasures and their limitations, paying special attention to the IoT protocols.
Posted Content
A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks
TL;DR: This paper has attempted to present an overview of the routing protocols, the known routing attacks and the proposed countermeasures to these attacks in various works.
Journal ArticleDOI
Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem
TL;DR: Results have shown that LPWANs communication technologies contain security vulnerabilities that can lead to irreversible harm in critical and non-critical IoT application domains, and the conception and implementation of up-to-date defenses are relevant to protect systems, networks, and data.
Journal ArticleDOI
Analysis of Detection Features for Wormhole Attacks in MANETs
TL;DR: This paper thoroughly analyzes existing techniques to counter wormhole attacks in MANETs on the basis of their limitations as well as features that are vital in detecting wormholes in the network.
Journal ArticleDOI
Vehicle authentication via monolithically certified public key and attributes
TL;DR: This is the first work that proposes to certify both the public key and out-of-band sense-able static attributes to enable mutual authentication of the communicating vehicles to avoid impersonation attacks.
References
More filters
Ad hoc On-Demand Distance Vector (AODV) Routing
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Journal ArticleDOI
Securing ad hoc networks
Lidong Zhou,Zygmunt J. Haas +1 more
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations
S. Corson,Joseph P. Macker +1 more
TL;DR: The characteristics of Mobile Ad hoc Networks (MANETs), and their idiosyncrasies with respect to traditional, hardwired packet networks, are described, with an emphasis on routing performance evaluation considerations.
Proceedings ArticleDOI
Packet leashes: a defense against wormhole attacks in wireless networks
TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.