Aviso: para depositar documentos, por favor, inicia sesión e identifícate con tu cuenta de correo institucional de la UCM con el botón MI CUENTA UCM. No emplees la opción AUTENTICACIÓN CON CONTRASEÑA
 

Secure extension to the optimised link state routing protocol

dc.contributor.authorGarcía Villalba, Luis Javier
dc.contributor.authorGarcía Matesanz, Julián
dc.contributor.authorRupérez Cañas, D.
dc.contributor.authorSandoval Orozco, Ana Lucila
dc.date.accessioned2023-06-20T00:12:06Z
dc.date.available2023-06-20T00:12:06Z
dc.date.issued2011
dc.description.abstractThe design of routing protocols for mobile ad hoc networks rarely contemplates, in most cases, hostile environments. Consequently, it is common to add security extensions afterwards. One of the most important routing protocols is the optimised link state routing (OLSR), which in its specification assumes the trust of all nodes in the network, making it vulnerable to different kinds of attacks. This study presents an extension of OLSR, called COD-OLSR, which provides security for OLSR in the case of incorrect message generation attacks which can occur in two forms (identity spoofing and link spoofing). This is one of its main features, which takes into account the current topology of the node sending the message. The behaviour of COD-OLSR against different attackers in a variety of situations is evaluated. The simulation results show that COD-OLSR adds a slight overhead to OLSR and barely affects performance. The results also show that COD-OLSR is an interesting alternative to provide integrity in OLSR compared with classical mechanisms making use of cryptography, which is more complex and has a high overhead.
dc.description.departmentSección Deptal. de Sistemas Informáticos y Computación
dc.description.facultyFac. de Ciencias Matemáticas
dc.description.refereedTRUE
dc.description.sponsorshipMinisterio de Ciencia e Innovación (Spain)
dc.description.sponsorshipMinisterio de Industria, turismo y Comercio (Spain)
dc.description.statuspub
dc.eprint.idhttps://eprints.ucm.es/id/eprint/15440
dc.identifier.doi10.1049/iet-ifs.2010.0085
dc.identifier.issn1751-8709
dc.identifier.officialurlhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6022945
dc.identifier.relatedurlhttp://www.ieee.org
dc.identifier.urihttps://hdl.handle.net/20.500.14352/42183
dc.issue.number3
dc.journal.titleIET Information Security
dc.language.isoeng
dc.page.final169
dc.page.initial163
dc.publisherThe Institution of Engineering and Technology
dc.relation.projectIDTEC2007-67129/TCM
dc.relation.projectIDTEC2010-18894/TCM
dc.relation.projectIDProject Avanza Competitividad I + D + I TSI-020100-
dc.rights.accessRightsrestricted access
dc.subject.cdu004.056
dc.subject.keywordAd-hoc networks
dc.subject.keywordWormhole attacks
dc.subject.ucmSeguridad informática
dc.titleSecure extension to the optimised link state routing protocol
dc.typejournal article
dc.volume.number5
dcterms.referencesIETF: ‘Mobile ad-hoc networks (MANET) working group’. Available at http://www.ietf.org/html.charters/manet-charter.html Clausen, T., Jacquet, P.: ‘Optimized link state routing protocol (OLSR)’.IETF RFC3626, 2003, available at http//www.ietf.org/rfc/rfc3626.txt Halfslund, A., Tonnesen, A., Rotvik, R.B., Andersson, J., Kure, O.:‘Secure extension to the OLSR protocol’. OLSR Interop and Workshop, 2004 Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Mu¨hlethaler, P., Raffo,D.: ‘Securing the OLSR protocol’. Proc. Med-Hoc-Net, Mahdia,Tunisia, June 2003 Raffo, D., Clausen, T., Adjih, C., Mu¨hlethaler, P.: ‘An advanced signature system for OLSR’. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN-04), Washington, DC, USA, October 2004 Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: ‘OLSR with GPS information’. Proc. 2004 Internet Conf. (IC 2004), Tsukuba, Japan,October 2004 Papadimitratos, P., Haas, Z.J.: ‘Secure link state routing for mobile ad hoc networks’. Proc. 2003 Symp. Applications and the Internet Workshops (SAINT’03 Workshops), DC, USA, January 2003,pp. 379–383 Nait-Abdesselam, F.: ‘Detecting and avoiding wormhole attacks in wireless ad hoc networks’, IEEE Commun. Mag., 2008, 46, (4),pp. 127–133 Abusalah, L., Khokhar, A., Guizani, M.: ‘A survey of secure mobile Ad Hoc routing protocols’, IEEE Commun. Surv. Tutor., 2008, 10, (4),pp. 78–93 Kannhavong, B., Nakayama, H., Kato, N., Jamalipour, A., Nemoto,Y.: ‘A study of a routing attack in OLSR-based mobile ad hoc networks’, Int. J. Commun. Syst. (IJCOMSYS), 2007, 20, (11),pp. 1245–1261 Hu, Y.C., Perrig, A., Johnson, D.B.: ‘Wormhole attacks in wireless networks’, IEEE J. Sel. Areas Commun. (JSAC),2006, 24,(2),pp. 370–380 The ns-3 network simulator. Available at ttp://www.nsnam.org
dspace.entity.typePublication
relation.isAuthorOfPublication0f67f6b3-4d2f-4545-90e1-95b8d9f3e1f0
relation.isAuthorOfPublication2edb0904-329e-4db5-87dc-348fb754d4d9
relation.isAuthorOfPublicationdea44425-99a5-4fef-b005-52d0713d0e0d
relation.isAuthorOfPublication.latestForDiscovery2edb0904-329e-4db5-87dc-348fb754d4d9

Download

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
03.pdf
Size:
595.05 KB
Format:
Adobe Portable Document Format

Collections