Secure extension to the optimised link state routing protocol
dc.contributor.author | García Villalba, Luis Javier | |
dc.contributor.author | García Matesanz, Julián | |
dc.contributor.author | Rupérez Cañas, D. | |
dc.contributor.author | Sandoval Orozco, Ana Lucila | |
dc.date.accessioned | 2023-06-20T00:12:06Z | |
dc.date.available | 2023-06-20T00:12:06Z | |
dc.date.issued | 2011 | |
dc.description.abstract | The design of routing protocols for mobile ad hoc networks rarely contemplates, in most cases, hostile environments. Consequently, it is common to add security extensions afterwards. One of the most important routing protocols is the optimised link state routing (OLSR), which in its specification assumes the trust of all nodes in the network, making it vulnerable to different kinds of attacks. This study presents an extension of OLSR, called COD-OLSR, which provides security for OLSR in the case of incorrect message generation attacks which can occur in two forms (identity spoofing and link spoofing). This is one of its main features, which takes into account the current topology of the node sending the message. The behaviour of COD-OLSR against different attackers in a variety of situations is evaluated. The simulation results show that COD-OLSR adds a slight overhead to OLSR and barely affects performance. The results also show that COD-OLSR is an interesting alternative to provide integrity in OLSR compared with classical mechanisms making use of cryptography, which is more complex and has a high overhead. | |
dc.description.department | Sección Deptal. de Sistemas Informáticos y Computación | |
dc.description.faculty | Fac. de Ciencias Matemáticas | |
dc.description.refereed | TRUE | |
dc.description.sponsorship | Ministerio de Ciencia e Innovación (Spain) | |
dc.description.sponsorship | Ministerio de Industria, turismo y Comercio (Spain) | |
dc.description.status | pub | |
dc.eprint.id | https://eprints.ucm.es/id/eprint/15440 | |
dc.identifier.doi | 10.1049/iet-ifs.2010.0085 | |
dc.identifier.issn | 1751-8709 | |
dc.identifier.officialurl | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6022945 | |
dc.identifier.relatedurl | http://www.ieee.org | |
dc.identifier.uri | https://hdl.handle.net/20.500.14352/42183 | |
dc.issue.number | 3 | |
dc.journal.title | IET Information Security | |
dc.language.iso | eng | |
dc.page.final | 169 | |
dc.page.initial | 163 | |
dc.publisher | The Institution of Engineering and Technology | |
dc.relation.projectID | TEC2007-67129/TCM | |
dc.relation.projectID | TEC2010-18894/TCM | |
dc.relation.projectID | Project Avanza Competitividad I + D + I TSI-020100- | |
dc.rights.accessRights | restricted access | |
dc.subject.cdu | 004.056 | |
dc.subject.keyword | Ad-hoc networks | |
dc.subject.keyword | Wormhole attacks | |
dc.subject.ucm | Seguridad informática | |
dc.title | Secure extension to the optimised link state routing protocol | |
dc.type | journal article | |
dc.volume.number | 5 | |
dcterms.references | IETF: ‘Mobile ad-hoc networks (MANET) working group’. Available at http://www.ietf.org/html.charters/manet-charter.html Clausen, T., Jacquet, P.: ‘Optimized link state routing protocol (OLSR)’.IETF RFC3626, 2003, available at http//www.ietf.org/rfc/rfc3626.txt Halfslund, A., Tonnesen, A., Rotvik, R.B., Andersson, J., Kure, O.:‘Secure extension to the OLSR protocol’. OLSR Interop and Workshop, 2004 Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Mu¨hlethaler, P., Raffo,D.: ‘Securing the OLSR protocol’. Proc. Med-Hoc-Net, Mahdia,Tunisia, June 2003 Raffo, D., Clausen, T., Adjih, C., Mu¨hlethaler, P.: ‘An advanced signature system for OLSR’. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN-04), Washington, DC, USA, October 2004 Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: ‘OLSR with GPS information’. Proc. 2004 Internet Conf. (IC 2004), Tsukuba, Japan,October 2004 Papadimitratos, P., Haas, Z.J.: ‘Secure link state routing for mobile ad hoc networks’. Proc. 2003 Symp. Applications and the Internet Workshops (SAINT’03 Workshops), DC, USA, January 2003,pp. 379–383 Nait-Abdesselam, F.: ‘Detecting and avoiding wormhole attacks in wireless ad hoc networks’, IEEE Commun. Mag., 2008, 46, (4),pp. 127–133 Abusalah, L., Khokhar, A., Guizani, M.: ‘A survey of secure mobile Ad Hoc routing protocols’, IEEE Commun. Surv. Tutor., 2008, 10, (4),pp. 78–93 Kannhavong, B., Nakayama, H., Kato, N., Jamalipour, A., Nemoto,Y.: ‘A study of a routing attack in OLSR-based mobile ad hoc networks’, Int. J. Commun. Syst. (IJCOMSYS), 2007, 20, (11),pp. 1245–1261 Hu, Y.C., Perrig, A., Johnson, D.B.: ‘Wormhole attacks in wireless networks’, IEEE J. Sel. Areas Commun. (JSAC),2006, 24,(2),pp. 370–380 The ns-3 network simulator. Available at ttp://www.nsnam.org | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 0f67f6b3-4d2f-4545-90e1-95b8d9f3e1f0 | |
relation.isAuthorOfPublication | 2edb0904-329e-4db5-87dc-348fb754d4d9 | |
relation.isAuthorOfPublication | dea44425-99a5-4fef-b005-52d0713d0e0d | |
relation.isAuthorOfPublication.latestForDiscovery | 2edb0904-329e-4db5-87dc-348fb754d4d9 |
Download
Original bundle
1 - 1 of 1