DOI QR코드

DOI QR Code

Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks

  • Received : 2011.12.29
  • Accepted : 2012.05.20
  • Published : 2013.02.28

Abstract

Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.

Keywords

References

  1. B. Kannhavong, H. Nakayama, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE trans. Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007. https://doi.org/10.1109/MWC.2007.4396947
  2. T. Clausen and P. Jacquet, "IETF RFC3626: Optimized link state routing protocol (OLSR)," Experimental, 2003.
  3. T. Clausen and U.Herberg, "Security issues in the optimized link state routing protocol version 2 (OLSRv2)," Int. J. Netw. Security Appl., 2010.
  4. B. Kannhavong, H. Nakayama and A. Jamalipour, "A study of routing attack in OLSR-based mobile ad hoc networks," Int. J. Commun. Syst., 2007.
  5. B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, "Analysis of the node isolation attack against OLSR-based mobile ad hoc network," in Proc. ISCN, 2006, pp. 30-35.
  6. D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "Securing the OLSR protocol," in Proc. Med-Hoc-Net, 2003.
  7. D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "An advanced signature system for OLSR," in Proc. ACM SASN, 2004.
  8. D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "Attacks against OLSR: Distributed key management for security," in Proc. OLSR Interop and Workshop, 2005.
  9. C. Adjih, T. Clausen, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR routing protocol with or without compromised nodes in the network," HIPERCOM Project, INRIA Rocquencourt, Tech. Rep. INRIA RR-5494, Feb. 2005.
  10. D. Dhillon, T. S. Randhawa, M. Wang, and L. Lamont, "Implementing a fully distributed certificate autorithy in an OLSRMANET," in Proc. IEEE WCNC, 2004.
  11. D. Dhillon, J. Zhu, J. Richards, and T. Randhawa, "Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs," in Proc. IWCMC, 2006.
  12. A. J. P. Vilela and J. Barros, "A cooperative security scheme for optimized link state routing in mobile ad-hoc networks," in Proc. IST MWCS, 2006.
  13. A. Adnane, R. de Sousa, C. Bidan, and L. Me, "Analysis of the implicit trust within the OLSR protocol," in Proc. IFIP, 2007.
  14. X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: A library for parallel simulation of large-scale wireless networks," in Proc. PADS, 1998.
  15. D. Raffo, "Security schemes fo the OLSR protocol for ad hoc networks," Ph.D. dissertation, Univ. Paris, 2005
  16. M. Mohanapriya and S. Urmila, "A novel technique for defending routing attacks in OLSR MANET," in Proc. IEEE ICCIC, 2010.