Part II - Thwarting malicious behavior
Published online by Cambridge University Press: 05 June 2012
Summary
This second part of this book is about malicious behavior in wireless networks. Each of the chapters describes a fundamental aspect, by first introducing some possible attacks, and then detailing the corresponding countermeasures.
Chapter 4 describes the question of how to designate an end station in a network. It shows that the question is far from being solved, even in the Internet. It then describes the related attacks, namely the Sybil and the replication attacks. Finally, it explains how they can be thwarted.
Chapter 5 is about bootstrapping security between wireless devices located in radio range of each other. An attacker can try to fool one of the parties by establishing a security association with the attacker (herself) rather than with another intended party. The described countermeasures take advantage of physical vicinity or of the mobility of the nodes.
Chapter 6 focuses on the notion of (radio) neighbor. With the wormhole attack, it is possible to let a given node believe that another node is in its radio range, when in reality it is not. This chapter explains why this attack is dangerous, and details the several techniques to thwart it.
Chapter 7 addresses the problem of secure routing in multi-hop wireless networks. It explains that, if unprotected, routing is vulnerable to a vast collection of devastating attacks. It then explains the basic mechanisms to prevent them.
- Type
- Chapter
- Information
- Security and Cooperation in Wireless NetworksThwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, pp. 83 - 84Publisher: Cambridge University PressPrint publication year: 2007