Browse > Article
http://dx.doi.org/10.1109/JCN.2013.000007

Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks  

Marimuthu, Mohanapriya (Sri Krishna College of Engineering and Technology)
Krishnamurthi, Ilango (Sri Krishna College of Engineering and Technology)
Publication Information
Abstract
Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.
Keywords
Ad hoc networks; denial-of-service (DOS) attack; node isolation attack; optimized link state routing (OLSR); routing protocols;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Dhillon, T. S. Randhawa, M. Wang, and L. Lamont, "Implementing a fully distributed certificate autorithy in an OLSRMANET," in Proc. IEEE WCNC, 2004.
2 D. Dhillon, J. Zhu, J. Richards, and T. Randhawa, "Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs," in Proc. IWCMC, 2006.
3 A. J. P. Vilela and J. Barros, "A cooperative security scheme for optimized link state routing in mobile ad-hoc networks," in Proc. IST MWCS, 2006.
4 A. Adnane, R. de Sousa, C. Bidan, and L. Me, "Analysis of the implicit trust within the OLSR protocol," in Proc. IFIP, 2007.
5 X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: A library for parallel simulation of large-scale wireless networks," in Proc. PADS, 1998.
6 D. Raffo, "Security schemes fo the OLSR protocol for ad hoc networks," Ph.D. dissertation, Univ. Paris, 2005
7 M. Mohanapriya and S. Urmila, "A novel technique for defending routing attacks in OLSR MANET," in Proc. IEEE ICCIC, 2010.
8 B. Kannhavong, H. Nakayama, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE trans. Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007.   DOI   ScienceOn
9 T. Clausen and P. Jacquet, "IETF RFC3626: Optimized link state routing protocol (OLSR)," Experimental, 2003.
10 T. Clausen and U.Herberg, "Security issues in the optimized link state routing protocol version 2 (OLSRv2)," Int. J. Netw. Security Appl., 2010.
11 B. Kannhavong, H. Nakayama and A. Jamalipour, "A study of routing attack in OLSR-based mobile ad hoc networks," Int. J. Commun. Syst., 2007.
12 B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, "Analysis of the node isolation attack against OLSR-based mobile ad hoc network," in Proc. ISCN, 2006, pp. 30-35.
13 D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "Securing the OLSR protocol," in Proc. Med-Hoc-Net, 2003.
14 D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "An advanced signature system for OLSR," in Proc. ACM SASN, 2004.
15 D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler, "Attacks against OLSR: Distributed key management for security," in Proc. OLSR Interop and Workshop, 2005.
16 C. Adjih, T. Clausen, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR routing protocol with or without compromised nodes in the network," HIPERCOM Project, INRIA Rocquencourt, Tech. Rep. INRIA RR-5494, Feb. 2005.