Open Access Open Access  Restricted Access Subscription Access

Addressing Wormhole Attacks on the Internet

Ruay-Shiung Chang,
Shuo-Hung Wang,
Wei-Pang Yang,

Abstract


This paper proposes a new kind of attack, the wormhole attack, on the Internet. To launch a wormhole attack, an adversary connects two distinct malicious routers in the network using a communication link called a wormhole or a tunnel. The wormhole attack is a severe challenge especially for anomaly detection. Many existing solutions for anomaly detection try to identify the fake messages caused by malicious attack. Since the wormhole is a real path to forward packets, it is difficult to be detected via the existing routing protocols or security mechanisms. Once the wormhole is formed, the adversary can launch active or passive attacks. In this paper, we first survey related literatures about security mechanisms on the Internet, and then show their deficiencies in defending against wormhole attacks. Finally, we recommend some countermeasures that can be used to deal with the wormhole attacks in the Internet.

Keywords


Internet security; Wormhole attack; Security; protocols; Intrusion detection system

Citation Format:
Ruay-Shiung Chang, Shuo-Hung Wang, Wei-Pang Yang, "Addressing Wormhole Attacks on the Internet," Journal of Internet Technology, vol. 13, no. 2 , pp. 245-255, Mar. 2012.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Office of Library and Information Services, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 974301, Taiwan, R.O.C.
Tel: +886-3-931-7314  E-mail: jit.editorial@gmail.com