Professional Documents
Culture Documents
Wormhole Attack in Sensor Networks: Security and Cooperation in Wireless Networks Chapter 6: Securing Neighbor Discovery
Wormhole Attack in Sensor Networks: Security and Cooperation in Wireless Networks Chapter 6: Securing Neighbor Discovery
networks
notes:
– adversary’s transceivers are not regular nodes (no node is
compromised by the adversary)
– adversary doesn’t need to understand what it tunnels (e.g.,
encrypted packets can also be tunneled through the wormhole)
– it is easy to mount a wormhole and it may have devastating effects
on routing
y y y
x x x
y
x y x
y x
(f)
(d) (e)
wormhole
contactless
smart card fast
emulator connection
smart card
reader
emulator
user may be
far away from
the building