Biblioteca de la Universidad Complutense de Madrid

Secure extension to the optimised link state routing protocol


García Villalba, L.J. y García Matesanz, Julián y Rupérez Cañas, D. y Sandoval Orozco, Ana Lucila (2011) Secure extension to the optimised link state routing protocol. IET Information Security, 5 (3). pp. 163-169. ISSN 1751-8709

[img] PDF
Restringido a Sólo personal autorizado del repositorio hasta 2020.


URL Oficial:


The design of routing protocols for mobile ad hoc networks rarely contemplates, in most cases, hostile environments. Consequently, it is common to add security extensions afterwards. One of the most important routing protocols is the optimised link state routing (OLSR), which in its specification assumes the trust of all nodes in the network, making it vulnerable to different kinds of attacks. This study presents an extension of OLSR, called COD-OLSR, which provides security for OLSR in the case of incorrect message generation attacks which can occur in two forms (identity spoofing and link spoofing). This is one of its main features, which takes into account the current topology of the node sending the message. The behaviour of COD-OLSR against different attackers in a variety of situations is evaluated. The simulation results show that COD-OLSR adds a slight overhead to OLSR and barely affects performance. The results also show that COD-OLSR is an interesting alternative to provide integrity in OLSR compared with classical mechanisms making use of cryptography, which is more complex and has a high overhead.

Tipo de documento:Artículo
Palabras clave:Ad-hoc networks; Wormhole attacks
Materias:Ciencias > Informática > Seguridad informática
Código ID:15440

IETF: ‘Mobile ad-hoc networks (MANET) working group’. Available at

Clausen, T., Jacquet, P.: ‘Optimized link state routing protocol (OLSR)’.IETF RFC3626, 2003, available at http//

Halfslund, A., Tonnesen, A., Rotvik, R.B., Andersson, J., Kure, O.:‘Secure extension to the OLSR protocol’. OLSR Interop and Workshop, 2004

Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Mu¨hlethaler, P., Raffo,D.: ‘Securing the OLSR protocol’. Proc. Med-Hoc-Net, Mahdia,Tunisia, June 2003

Raffo, D., Clausen, T., Adjih, C., Mu¨hlethaler, P.: ‘An advanced signature system for OLSR’. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN-04), Washington, DC, USA, October 2004

Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: ‘OLSR with GPS information’. Proc. 2004 Internet Conf. (IC 2004), Tsukuba, Japan,October 2004

Papadimitratos, P., Haas, Z.J.: ‘Secure link state routing for mobile ad hoc networks’. Proc. 2003 Symp. Applications and the Internet Workshops (SAINT’03 Workshops), DC, USA, January 2003,pp. 379–383

Nait-Abdesselam, F.: ‘Detecting and avoiding wormhole attacks in wireless ad hoc networks’, IEEE Commun. Mag., 2008, 46, (4),pp. 127–133

Abusalah, L., Khokhar, A., Guizani, M.: ‘A survey of secure mobile Ad Hoc routing protocols’, IEEE Commun. Surv. Tutor., 2008, 10, (4),pp. 78–93

Kannhavong, B., Nakayama, H., Kato, N., Jamalipour, A., Nemoto,Y.: ‘A study of a routing attack in OLSR-based mobile ad hoc networks’, Int. J. Commun. Syst. (IJCOMSYS), 2007, 20, (11),pp. 1245–1261

Hu, Y.C., Perrig, A., Johnson, D.B.: ‘Wormhole attacks in wireless networks’, IEEE J. Sel. Areas Commun. (JSAC),2006, 24,(2),pp. 370–380

The ns-3 network simulator. Available at ttp://

Depositado:31 May 2012 10:46
Última Modificación:08 Jul 2015 08:08

Sólo personal del repositorio: página de control del artículo