In-Band Wormholes and Countermeasures in OLSR Networks

In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kruus, P., Sterne, D., Gopaul, R., Heyman, M., Rivera, B., Budulas, P., Luu, B., Johnson, T., Ivanic, N., Lawler, G.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 11
container_issue
container_start_page 1
container_title
container_volume
creator Kruus, P.
Sterne, D.
Gopaul, R.
Heyman, M.
Rivera, B.
Budulas, P.
Luu, B.
Johnson, T.
Ivanic, N.
Lawler, G.
description In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness
doi_str_mv 10.1109/SECCOMW.2006.359551
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4198811</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4198811</ieee_id><sourcerecordid>4198811</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-d184662747c453bd86b939b15410c33f2d80a3f5322b194c56c96507952a67393</originalsourceid><addsrcrecordid>eNpVjMFKw0AURUdEUGq-oJv8QOJ782Ym85YaqhaiAVvoskySCUabRCYp4t9b0Y1nczl3cYRYIqSIwDebVZ6XT7tUApiUNGuNZyLizKKSSoGSBOf_XNKliKbpDU4QG8lwJcx6SO7c0MS7MfSv48FP8Y_l43GYfei9m47h9HVDXBabl_jZz59jeJ-uxUXrDpOP_nYhtverbf6YFOXDOr8tko5hThq0yhiZqaxWmqrGmoqJK9QKoSZqZWPBUatJygpZ1drUbDRkrKUzGTEtxPI323nv9x-h61342itkaxHpG6c0RXQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>In-Band Wormholes and Countermeasures in OLSR Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kruus, P. ; Sterne, D. ; Gopaul, R. ; Heyman, M. ; Rivera, B. ; Budulas, P. ; Luu, B. ; Johnson, T. ; Ivanic, N. ; Lawler, G.</creator><creatorcontrib>Kruus, P. ; Sterne, D. ; Gopaul, R. ; Heyman, M. ; Rivera, B. ; Budulas, P. ; Luu, B. ; Johnson, T. ; Ivanic, N. ; Lawler, G.</creatorcontrib><description>In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness</description><identifier>ISBN: 9781424404223</identifier><identifier>ISBN: 1424404223</identifier><identifier>EISBN: 9781424404230</identifier><identifier>EISBN: 1424404231</identifier><identifier>DOI: 10.1109/SECCOMW.2006.359551</identifier><language>eng</language><publisher>IEEE</publisher><subject>Collaboration ; Communication system traffic control ; Computer network security ; Degradation ; Government ; Hardware ; Laboratories ; Mobile ad hoc networks ; Mobile communication ; mobile communications ; Radio frequency ; reachability analysis ; routing ; Routing protocols ; wormhole</subject><ispartof>2006 Securecomm and Workshops, 2006, p.1-11</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4198811$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4198811$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kruus, P.</creatorcontrib><creatorcontrib>Sterne, D.</creatorcontrib><creatorcontrib>Gopaul, R.</creatorcontrib><creatorcontrib>Heyman, M.</creatorcontrib><creatorcontrib>Rivera, B.</creatorcontrib><creatorcontrib>Budulas, P.</creatorcontrib><creatorcontrib>Luu, B.</creatorcontrib><creatorcontrib>Johnson, T.</creatorcontrib><creatorcontrib>Ivanic, N.</creatorcontrib><creatorcontrib>Lawler, G.</creatorcontrib><title>In-Band Wormholes and Countermeasures in OLSR Networks</title><title>2006 Securecomm and Workshops</title><addtitle>SECCOM</addtitle><description>In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness</description><subject>Collaboration</subject><subject>Communication system traffic control</subject><subject>Computer network security</subject><subject>Degradation</subject><subject>Government</subject><subject>Hardware</subject><subject>Laboratories</subject><subject>Mobile ad hoc networks</subject><subject>Mobile communication</subject><subject>mobile communications</subject><subject>Radio frequency</subject><subject>reachability analysis</subject><subject>routing</subject><subject>Routing protocols</subject><subject>wormhole</subject><isbn>9781424404223</isbn><isbn>1424404223</isbn><isbn>9781424404230</isbn><isbn>1424404231</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjMFKw0AURUdEUGq-oJv8QOJ782Ym85YaqhaiAVvoskySCUabRCYp4t9b0Y1nczl3cYRYIqSIwDebVZ6XT7tUApiUNGuNZyLizKKSSoGSBOf_XNKliKbpDU4QG8lwJcx6SO7c0MS7MfSv48FP8Y_l43GYfei9m47h9HVDXBabl_jZz59jeJ-uxUXrDpOP_nYhtverbf6YFOXDOr8tko5hThq0yhiZqaxWmqrGmoqJK9QKoSZqZWPBUatJygpZ1drUbDRkrKUzGTEtxPI323nv9x-h61342itkaxHpG6c0RXQ</recordid><startdate>200608</startdate><enddate>200608</enddate><creator>Kruus, P.</creator><creator>Sterne, D.</creator><creator>Gopaul, R.</creator><creator>Heyman, M.</creator><creator>Rivera, B.</creator><creator>Budulas, P.</creator><creator>Luu, B.</creator><creator>Johnson, T.</creator><creator>Ivanic, N.</creator><creator>Lawler, G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200608</creationdate><title>In-Band Wormholes and Countermeasures in OLSR Networks</title><author>Kruus, P. ; Sterne, D. ; Gopaul, R. ; Heyman, M. ; Rivera, B. ; Budulas, P. ; Luu, B. ; Johnson, T. ; Ivanic, N. ; Lawler, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-d184662747c453bd86b939b15410c33f2d80a3f5322b194c56c96507952a67393</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Collaboration</topic><topic>Communication system traffic control</topic><topic>Computer network security</topic><topic>Degradation</topic><topic>Government</topic><topic>Hardware</topic><topic>Laboratories</topic><topic>Mobile ad hoc networks</topic><topic>Mobile communication</topic><topic>mobile communications</topic><topic>Radio frequency</topic><topic>reachability analysis</topic><topic>routing</topic><topic>Routing protocols</topic><topic>wormhole</topic><toplevel>online_resources</toplevel><creatorcontrib>Kruus, P.</creatorcontrib><creatorcontrib>Sterne, D.</creatorcontrib><creatorcontrib>Gopaul, R.</creatorcontrib><creatorcontrib>Heyman, M.</creatorcontrib><creatorcontrib>Rivera, B.</creatorcontrib><creatorcontrib>Budulas, P.</creatorcontrib><creatorcontrib>Luu, B.</creatorcontrib><creatorcontrib>Johnson, T.</creatorcontrib><creatorcontrib>Ivanic, N.</creatorcontrib><creatorcontrib>Lawler, G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kruus, P.</au><au>Sterne, D.</au><au>Gopaul, R.</au><au>Heyman, M.</au><au>Rivera, B.</au><au>Budulas, P.</au><au>Luu, B.</au><au>Johnson, T.</au><au>Ivanic, N.</au><au>Lawler, G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>In-Band Wormholes and Countermeasures in OLSR Networks</atitle><btitle>2006 Securecomm and Workshops</btitle><stitle>SECCOM</stitle><date>2006-08</date><risdate>2006</risdate><spage>1</spage><epage>11</epage><pages>1-11</pages><isbn>9781424404223</isbn><isbn>1424404223</isbn><eisbn>9781424404230</eisbn><eisbn>1424404231</eisbn><abstract>In a wormhole attack, colluding nodes create the illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors, but are actually distant from each other. This undermines shortest-path routing calculations, allowing the attacking nodes to attract traffic, which can then be manipulated. Prior research has concentrated on out-of-band wormholes, which covertly connect the purported neighbors via a separate wireline network or RF channel. We present a detailed description of in-band wormholes in OLSR networks. These connect the purported neighbors via covert, multi-hop tunnels. In-band wormholes are an important threat because they do not require specialized hardware and can be launched by any node in the MANET. Moreover, unlike out-of-band wormholes, in-band wormholes consume network capacity, inherently degrading service. We explain the conditions under which an in-band wormhole will collapse and how it can be made collapse resilient. We identify the self-contained and extended forms of in-band wormholes and present wormhole gravitational analysis, a technique for comparing the effect of wormholes on the network. Finally, we identify potential countermeasures for preventing and detecting in-band wormholes based on packet loss rates, packet delays, and topological characteristics, and we describe the results of initial laboratory experiments to assess their effectiveness</abstract><pub>IEEE</pub><doi>10.1109/SECCOMW.2006.359551</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424404223
ispartof 2006 Securecomm and Workshops, 2006, p.1-11
issn
language eng
recordid cdi_ieee_primary_4198811
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Collaboration
Communication system traffic control
Computer network security
Degradation
Government
Hardware
Laboratories
Mobile ad hoc networks
Mobile communication
mobile communications
Radio frequency
reachability analysis
routing
Routing protocols
wormhole
title In-Band Wormholes and Countermeasures in OLSR Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A20%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=In-Band%20Wormholes%20and%20Countermeasures%20in%20OLSR%20Networks&rft.btitle=2006%20Securecomm%20and%20Workshops&rft.au=Kruus,%20P.&rft.date=2006-08&rft.spage=1&rft.epage=11&rft.pages=1-11&rft.isbn=9781424404223&rft.isbn_list=1424404223&rft_id=info:doi/10.1109/SECCOMW.2006.359551&rft_dat=%3Cieee_6IE%3E4198811%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424404230&rft.eisbn_list=1424404231&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4198811&rfr_iscdi=true