Complutense University Library

Secure extension to the optimised link state routing protocol

García Villalba, L.J. and García Matesanz, Julián and Rupérez Cañas, D. and Sandoval Orozco, Ana Lucila (2011) Secure extension to the optimised link state routing protocol. IET Information Security, 5 (3). pp. 163-169. ISSN 1751-8709

[img] PDF
Restricted to Repository staff only until 2020.

609kB

Official URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6022945

View download statistics for this eprint

==>>> Export to other formats

Abstract

The design of routing protocols for mobile ad hoc networks rarely contemplates, in most cases, hostile environments. Consequently, it is common to add security extensions afterwards. One of the most important routing protocols is the optimised link state routing (OLSR), which in its specification assumes the trust of all nodes in the network, making it vulnerable to different kinds of attacks. This study presents an extension of OLSR, called COD-OLSR, which provides security for OLSR in the case of incorrect message generation attacks which can occur in two forms (identity spoofing and link spoofing). This is one of its main features, which takes into account the current topology of the node sending the message. The behaviour of COD-OLSR against different attackers in a variety of situations is evaluated. The simulation results show that COD-OLSR adds a slight overhead to OLSR and barely affects performance. The results also show that COD-OLSR is an interesting alternative to provide integrity in OLSR compared with classical mechanisms making use of cryptography, which is more complex and has a high overhead.


Item Type:Article
Uncontrolled Keywords:Ad-hoc networks; Wormhole attacks
Subjects:Sciences > Computer science > Computer security
ID Code:15440
References:

IETF: ‘Mobile ad-hoc networks (MANET) working group’. Available at http://www.ietf.org/html.charters/manet-charter.html

Clausen, T., Jacquet, P.: ‘Optimized link state routing protocol (OLSR)’.IETF RFC3626, 2003, available at http//www.ietf.org/rfc/rfc3626.txt

Halfslund, A., Tonnesen, A., Rotvik, R.B., Andersson, J., Kure, O.:‘Secure extension to the OLSR protocol’. OLSR Interop and Workshop, 2004

Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Mu¨hlethaler, P., Raffo,D.: ‘Securing the OLSR protocol’. Proc. Med-Hoc-Net, Mahdia,Tunisia, June 2003

Raffo, D., Clausen, T., Adjih, C., Mu¨hlethaler, P.: ‘An advanced signature system for OLSR’. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN-04), Washington, DC, USA, October 2004

Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: ‘OLSR with GPS information’. Proc. 2004 Internet Conf. (IC 2004), Tsukuba, Japan,October 2004

Papadimitratos, P., Haas, Z.J.: ‘Secure link state routing for mobile ad hoc networks’. Proc. 2003 Symp. Applications and the Internet Workshops (SAINT’03 Workshops), DC, USA, January 2003,pp. 379–383

Nait-Abdesselam, F.: ‘Detecting and avoiding wormhole attacks in wireless ad hoc networks’, IEEE Commun. Mag., 2008, 46, (4),pp. 127–133

Abusalah, L., Khokhar, A., Guizani, M.: ‘A survey of secure mobile Ad Hoc routing protocols’, IEEE Commun. Surv. Tutor., 2008, 10, (4),pp. 78–93

Kannhavong, B., Nakayama, H., Kato, N., Jamalipour, A., Nemoto,Y.: ‘A study of a routing attack in OLSR-based mobile ad hoc networks’, Int. J. Commun. Syst. (IJCOMSYS), 2007, 20, (11),pp. 1245–1261

Hu, Y.C., Perrig, A., Johnson, D.B.: ‘Wormhole attacks in wireless networks’, IEEE J. Sel. Areas Commun. (JSAC),2006, 24,(2),pp. 370–380

The ns-3 network simulator. Available at ttp://www.nsnam.org

Deposited On:31 May 2012 10:46
Last Modified:06 Feb 2014 10:24

Repository Staff Only: item control page