Trust-Based Countermeasures for Securing OLSR Protocol

In this paper, we present two measures to counter attacks against OLSR: prevention that solves some protocol's vulnerabilities, and countermeasures that treat misbehavior and inconsistency concerned by the vulnerabilities that have not been solved with prevention measures. The resulting mechanisms allow to resolve the OLSR vulnerabilities which are due to the easy usurpation of node's identity, and the lack of links verification at the neighborhood discovery. However, these mechanisms do not resolve other vulnerabilities, such as the lack of monitoring of the establishment of the routing tables. Thus, when other vulnerabilities are exploited and an attack is detected, we propose countermeasures to isolate malicious nodes.

[1]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[2]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[3]  Rafael Timóteo de Sousa Júnior,et al.  Integrating trust reasonings into node behavior in olsr , 2007, Q2SWinet '07.

[4]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[5]  Christophe Bidan,et al.  Validation of the OLSR routing table based on trust reasoning , 2008 .

[6]  Salima Hamma,et al.  A Multiple Description Coding strategy for Multi-Path in Mobile Ad hoc Networks , 2007 .

[7]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[8]  Christophe Bidan,et al.  Analysis of the implicit trust within OLSR , 2007 .

[9]  M. Wang,et al.  An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[10]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Christophe Bidan,et al.  Secure long term communities in ad hoc networks , 2003, SASN '03.

[12]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .

[13]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[14]  Rafael Timóteo de Sousa Júnior,et al.  Effectiveness of Trust Reasoning for Attack Detection in OLSR , 2008, WOSIS.

[15]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[16]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[17]  Oivind Kure,et al.  Secure Extension to the OLSR protocol , 2004 .