Open Access
Subscription Access
Addressing Wormhole Attacks on the Internet
Abstract
This paper proposes a new kind of attack, the wormhole attack, on the Internet. To launch a wormhole attack, an adversary connects two distinct malicious routers in the network using a communication link called a wormhole or a tunnel. The wormhole attack is a severe challenge especially for anomaly detection. Many existing solutions for anomaly detection try to identify the fake messages caused by malicious attack. Since the wormhole is a real path to forward packets, it is difficult to be detected via the existing routing protocols or security mechanisms. Once the wormhole is formed, the adversary can launch active or passive attacks. In this paper, we first survey related literatures about security mechanisms on the Internet, and then show their deficiencies in defending against wormhole attacks. Finally, we recommend some countermeasures that can be used to deal with the wormhole attacks in the Internet.
Keywords
Internet security; Wormhole attack; Security; protocols; Intrusion detection system
Citation Format:
Ruay-Shiung Chang, Shuo-Hung Wang, Wei-Pang Yang, "Addressing Wormhole Attacks on the Internet," Journal of Internet Technology, vol. 13, no. 2 , pp. 245-255, Mar. 2012.
Ruay-Shiung Chang, Shuo-Hung Wang, Wei-Pang Yang, "Addressing Wormhole Attacks on the Internet," Journal of Internet Technology, vol. 13, no. 2 , pp. 245-255, Mar. 2012.
Full Text:
PDFRefbacks
- There are currently no refbacks.
Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314 E-mail: jit.editorial@gmail.com