In-Band Wormholes and Countermeasures in OLSR Networks
In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 11 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Kruus, P. Sterne, D. Gopaul, R. Heyman, M. Rivera, B. Budulas, P. Luu, B. Johnson, T. Ivanic, N. Lawler, G. |
description | In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness |
doi_str_mv | 10.1109/SECCOMW.2006.359551 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4198811</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4198811</ieee_id><sourcerecordid>4198811</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-d184662747c453bd86b939b15410c33f2d80a3f5322b194c56c96507952a67393</originalsourceid><addsrcrecordid>eNpVjMFKw0AURUdEUGq-oJv8QOJ782Ym85YaqhaiAVvoskySCUabRCYp4t9b0Y1nczl3cYRYIqSIwDebVZ6XT7tUApiUNGuNZyLizKKSSoGSBOf_XNKliKbpDU4QG8lwJcx6SO7c0MS7MfSv48FP8Y_l43GYfei9m47h9HVDXBabl_jZz59jeJ-uxUXrDpOP_nYhtverbf6YFOXDOr8tko5hThq0yhiZqaxWmqrGmoqJK9QKoSZqZWPBUatJygpZ1drUbDRkrKUzGTEtxPI323nv9x-h61342itkaxHpG6c0RXQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>In-Band Wormholes and Countermeasures in OLSR Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kruus, P. ; Sterne, D. ; Gopaul, R. ; Heyman, M. ; Rivera, B. ; Budulas, P. ; Luu, B. ; Johnson, T. ; Ivanic, N. ; Lawler, G.</creator><creatorcontrib>Kruus, P. ; Sterne, D. ; Gopaul, R. ; Heyman, M. ; Rivera, B. ; Budulas, P. ; Luu, B. ; Johnson, T. ; Ivanic, N. ; Lawler, G.</creatorcontrib><description>In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness</description><identifier>ISBN: 9781424404223</identifier><identifier>ISBN: 1424404223</identifier><identifier>EISBN: 9781424404230</identifier><identifier>EISBN: 1424404231</identifier><identifier>DOI: 10.1109/SECCOMW.2006.359551</identifier><language>eng</language><publisher>IEEE</publisher><subject>Collaboration ; Communication system traffic control ; Computer network security ; Degradation ; Government ; Hardware ; Laboratories ; Mobile ad hoc networks ; Mobile communication ; mobile communications ; Radio frequency ; reachability analysis ; routing ; Routing protocols ; wormhole</subject><ispartof>2006 Securecomm and Workshops, 2006, p.1-11</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4198811$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4198811$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kruus, P.</creatorcontrib><creatorcontrib>Sterne, D.</creatorcontrib><creatorcontrib>Gopaul, R.</creatorcontrib><creatorcontrib>Heyman, M.</creatorcontrib><creatorcontrib>Rivera, B.</creatorcontrib><creatorcontrib>Budulas, P.</creatorcontrib><creatorcontrib>Luu, B.</creatorcontrib><creatorcontrib>Johnson, T.</creatorcontrib><creatorcontrib>Ivanic, N.</creatorcontrib><creatorcontrib>Lawler, G.</creatorcontrib><title>In-Band Wormholes and Countermeasures in OLSR Networks</title><title>2006 Securecomm and Workshops</title><addtitle>SECCOM</addtitle><description>In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness</description><subject>Collaboration</subject><subject>Communication system traffic control</subject><subject>Computer network security</subject><subject>Degradation</subject><subject>Government</subject><subject>Hardware</subject><subject>Laboratories</subject><subject>Mobile ad hoc networks</subject><subject>Mobile communication</subject><subject>mobile communications</subject><subject>Radio frequency</subject><subject>reachability analysis</subject><subject>routing</subject><subject>Routing protocols</subject><subject>wormhole</subject><isbn>9781424404223</isbn><isbn>1424404223</isbn><isbn>9781424404230</isbn><isbn>1424404231</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjMFKw0AURUdEUGq-oJv8QOJ782Ym85YaqhaiAVvoskySCUabRCYp4t9b0Y1nczl3cYRYIqSIwDebVZ6XT7tUApiUNGuNZyLizKKSSoGSBOf_XNKliKbpDU4QG8lwJcx6SO7c0MS7MfSv48FP8Y_l43GYfei9m47h9HVDXBabl_jZz59jeJ-uxUXrDpOP_nYhtverbf6YFOXDOr8tko5hThq0yhiZqaxWmqrGmoqJK9QKoSZqZWPBUatJygpZ1drUbDRkrKUzGTEtxPI323nv9x-h61342itkaxHpG6c0RXQ</recordid><startdate>200608</startdate><enddate>200608</enddate><creator>Kruus, P.</creator><creator>Sterne, D.</creator><creator>Gopaul, R.</creator><creator>Heyman, M.</creator><creator>Rivera, B.</creator><creator>Budulas, P.</creator><creator>Luu, B.</creator><creator>Johnson, T.</creator><creator>Ivanic, N.</creator><creator>Lawler, G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200608</creationdate><title>In-Band Wormholes and Countermeasures in OLSR Networks</title><author>Kruus, P. ; Sterne, D. ; Gopaul, R. ; Heyman, M. ; Rivera, B. ; Budulas, P. ; Luu, B. ; Johnson, T. ; Ivanic, N. ; Lawler, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-d184662747c453bd86b939b15410c33f2d80a3f5322b194c56c96507952a67393</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Collaboration</topic><topic>Communication system traffic control</topic><topic>Computer network security</topic><topic>Degradation</topic><topic>Government</topic><topic>Hardware</topic><topic>Laboratories</topic><topic>Mobile ad hoc networks</topic><topic>Mobile communication</topic><topic>mobile communications</topic><topic>Radio frequency</topic><topic>reachability analysis</topic><topic>routing</topic><topic>Routing protocols</topic><topic>wormhole</topic><toplevel>online_resources</toplevel><creatorcontrib>Kruus, P.</creatorcontrib><creatorcontrib>Sterne, D.</creatorcontrib><creatorcontrib>Gopaul, R.</creatorcontrib><creatorcontrib>Heyman, M.</creatorcontrib><creatorcontrib>Rivera, B.</creatorcontrib><creatorcontrib>Budulas, P.</creatorcontrib><creatorcontrib>Luu, B.</creatorcontrib><creatorcontrib>Johnson, T.</creatorcontrib><creatorcontrib>Ivanic, N.</creatorcontrib><creatorcontrib>Lawler, G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kruus, P.</au><au>Sterne, D.</au><au>Gopaul, R.</au><au>Heyman, M.</au><au>Rivera, B.</au><au>Budulas, P.</au><au>Luu, B.</au><au>Johnson, T.</au><au>Ivanic, N.</au><au>Lawler, G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>In-Band Wormholes and Countermeasures in OLSR Networks</atitle><btitle>2006 Securecomm and Workshops</btitle><stitle>SECCOM</stitle><date>2006-08</date><risdate>2006</risdate><spage>1</spage><epage>11</epage><pages>1-11</pages><isbn>9781424404223</isbn><isbn>1424404223</isbn><eisbn>9781424404230</eisbn><eisbn>1424404231</eisbn><abstract>In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness</abstract><pub>IEEE</pub><doi>10.1109/SECCOMW.2006.359551</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424404223 |
ispartof | 2006 Securecomm and Workshops, 2006, p.1-11 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4198811 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Collaboration Communication system traffic control Computer network security Degradation Government Hardware Laboratories Mobile ad hoc networks Mobile communication mobile communications Radio frequency reachability analysis routing Routing protocols wormhole |
title | In-Band Wormholes and Countermeasures in OLSR Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A20%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=In-Band%20Wormholes%20and%20Countermeasures%20in%20OLSR%20Networks&rft.btitle=2006%20Securecomm%20and%20Workshops&rft.au=Kruus,%20P.&rft.date=2006-08&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.isbn=9781424404223&rft.isbn_list=1424404223&rft_id=info:doi/10.1109/SECCOMW.2006.359551&rft_dat=%3Cieee_6IE%3E4198811%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424404230&rft.eisbn_list=1424404231&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4198811&rfr_iscdi=true |