Sciweavers

ICNP
2006
IEEE

TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks

14 years 3 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization, specialized hardware, or overhearing, making them difficult to realize in practice. TrueLink is a timing based countermeasure to the wormhole attack. Using TrueLink, a node i can verify the existence of a direct link to an apparent neighbor, j. Verification of a link i ↔ j operates in two phases. In the rendezvous phase, the nodes exchange nonces αj and βi. This is done with tight timing constraints, within which it is impossible for attackers to forward the exchange between distant nodes. In the authentication phase, i and j transmit a signed message (αj, βi), mutually authenticating themselves as the originator of their respective nonce. TrueLink does not rely on precise clock synchronization, GPS coordinates, overhearing, geometric inconsistencies, or sta...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali
Added 11 Jun 2010
Updated 11 Jun 2010
Type Conference
Year 2006
Where ICNP
Authors Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos
Comments (0)