Secure extension to the optimised link state routing protocol

Access Full Text

Secure extension to the optimised link state routing protocol

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The design of routing protocols for mobile ad hoc networks rarely contemplates, in most cases, hostile environments. Consequently, it is common to add security extensions afterwards. One of the most important routing protocols is the optimised link state routing (OLSR), which in its specification assumes the trust of all nodes in the network, making it vulnerable to different kinds of attacks. This study presents an extension of OLSR, called COD-OLSR, which provides security for OLSR in the case of incorrect message generation attacks which can occur in two forms (identity spoofing and link spoofing). This is one of its main features, which takes into account the current topology of the node sending the message. The behaviour of COD-OLSR against different attackers in a variety of situations is evaluated. The simulation results show that COD-OLSR adds a slight overhead to OLSR and barely affects performance. The results also show that COD-OLSR is an interesting alternative to provide integrity in OLSR compared with classical mechanisms making use of cryptography, which is more complex and has a high overhead.

Inspec keywords: mobile ad hoc networks; routing protocols; telecommunication security; cryptography

Other keywords: cryptography; mobile ad hoc networks; link spoofing; optimised link state routing protocol; hostile environment; incorrect message generation attacks; routing protocol design; secure extension; identity spoofing

Subjects: Mobile radio systems; Protocols; Communication network design, planning and routing; Cryptography

References

    1. 1)
      • Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Mühlethaler, P., Raffo, D.: `Securing the OLSR protocol', Proc. Med-Hoc-Net, June 2003, Mahdia, Tunisia.
    2. 2)
    3. 3)
    4. 4)
    5. 5)
      • Papadimitratos, P., Haas, Z.J.: `Secure link state routing for mobile ad hoc networks', Proc. 2003 Symp. Applications and the Internet Workshops (SAINT’03 Workshops), January 2003, DC, USA, p. 379–383.
    6. 6)
      • T. Clausen , P. Jacquet . Optimized link state routing protocol (OLSR). IETF RFC3626
    7. 7)
      • Raffo, D., Clausen, T., Adjih, C., Mühlethaler, P.: `An advanced signature system for OLSR', ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN-04), October 2004, Washington, DC, USA.
    8. 8)
      • Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: `OLSR with GPS information', Proc. 2004 Internet Conf. (IC 2004), October 2004, Tsukuba, Japan.
    9. 9)
      • IETF: ‘Mobile ad-hoc networks (MANET) working group’. Available at http://www.ietf.org/html.charters/manet-charter.html.
    10. 10)
    11. 11)
      • The ns-3 network simulator. Available at http://www.nsnam.org.
    12. 12)
      • Halfslund, A., Tonnesen, A., Rotvik, R.B., Andersson, J., Kure, O.: `Secure extension to the OLSR protocol', OLSR Interop and Workshop, 2004.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2010.0085
Loading

Related content

content/journals/10.1049/iet-ifs.2010.0085
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading