DOI QR코드

DOI QR Code

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep (Research and Development, Newgen Software Technologies New Delhi) ;
  • Sengupta, Jyotsna (Department of Computer Science, Punjabi University)
  • Published : 2009.02.23

Abstract

In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

Keywords

References

  1. Y.C. Hu, D.B. Hohnson, and A. Perrig. SEAD: “Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks,” Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 02), pp.3-13, 2002.
  2. M. Guerrero Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols,” Proceedings of ACM Workshop on Wireless Security (WiSe), pp.1-10, 2002.
  3. A. Perrig, R. Canetti, J. D. Tygar, and D. X. Song, “Efficient authentication and signing of multicast streams over lossy channels,” IEEE Symposium on Security and Privacy, pp.56-73, 2000.
  4. Zygmunt J. Haas, Marc R. Pearlman, and Prince Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” draft-ietf-manet-zone-zrp-04.txt, July, 2002.
  5. Vesa Karpijoki, “Signalling and Routing Security in Mobile and Ad-hoc Networks,” Department of Computer Science Helsinki University of Technology, May, 2000.
  6. Cedric Adjih, Daniele Raffo, Paul Muhlethaler, “Attacks Against OLSR: Distributed Key Management for Security,” INRIA, Domaine de Voluceau, France.
  7. Behrouz A. Froouzan, “Data Communications and Networking,” 3rd Edition, Tata McGraw Hill Edition, 2001.
  8. T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” RFC 3626, IETF Network Working Group, Oct. 2003.
  9. Daniele Raffo, Cedric Adjih, Thomas Clausen, and Paul Muhlethaler, “OLSR with GPS information,” Proceedings of the 2004 Internet Conference (IC 2004), Tsukuba, Japan, Oct. 28-29 2004.
  10. Navid Nikaen, “A short tutorial on routing issues in wireless ad hoc networks”
  11. Cedric Adjih, Thomas Clausen, Philippe Jacquet, Anis Laouiti, Paul Muhlethaler, and Daniele Raffo, “Securing the OLSR Protocol,” Proceedings of the 2nd IFIP Med-Hoc-Net 2003, Mahdia, Tunisia, June 25-27, 2003.
  12. Daniele Raffo, Cedric Adjih, Thomas Clausen, and Paul Muhlethaler, “An advanced signature system for OLSR,” Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pp.10-16, Washington, DC, USA, Oct. 25, 2004.
  13. Daniele Raffo, Cedric Adjih, Thomas Clausen, and Paul Muhlethaler, “Securing OLSR using node locations,” Proceedings of 2005 European Wireless (EW 2005), pp. 437-443, Nicosia, Cyprus, Apr. 10-13, 2005.

Cited by

  1. A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET vol.90, pp.2, 2016, https://doi.org/10.1007/s11277-016-3229-5
  2. An Adaptive Security Model for Dynamic Node Behaviour in MANETs vol.12, pp.6, 2009, https://doi.org/10.3837/tiis.2018.06.023