Enhanced OLSR for defense against DOS attack in ad hoc networks

Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.

[1]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[2]  Daniele Raffo,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks. (Schémas de sécurité pour le protocole OLSR pour les réseaux ad hoc) , 2005 .

[3]  Danny Dhillon,et al.  Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[4]  Paul Mühlethaler,et al.  An advanced signature system for OLSR , 2004, SASN '04.

[5]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[6]  Nei Kato,et al.  Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.

[7]  Danny Dhillon,et al.  Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs , 2006, IWCMC '06.

[8]  M. Mohana Priya A NOVEL TECHNIQUE FOR DEFENDING ROUTING ATTACKS IN OLSR MANET , 2010 .

[9]  Rafael Timóteo de Sousa Júnior,et al.  Analysis of the implicit trust within the OLSR protocol , 2007, IFIPTM.

[10]  João Barros,et al.  A Cooperative Security Scheme for Optimized Link State Routing in Mobile Ad-hoc Networks , 2005 .

[11]  Nei Kato,et al.  A study of a routing attack in OLSR-based mobile ad hoc networks , 2007 .

[12]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[13]  Thomas H. Clausen,et al.  Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) , 2010, ArXiv.

[14]  Nei Kato,et al.  A study of a routing attack in OLSR-based mobile ad hoc networks , 2007, Int. J. Commun. Syst..

[15]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[16]  Anis Laouiti,et al.  Securing the OLSR routing protocol with or without compromised nodes in the network , 2005 .

[17]  M. Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).

[18]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .