A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks

Contemporary personal computing devices are increasingly required to be portable and mobile enabling user's wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the "WMN test-bed" to enable secure routing in MANETs. The use of cryptography is an efficient proven way of securing data in communications, but some cryptographic algorithms are not as efficient as others and require more processing power, which is detrimental to MANETs. In this article we have assessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing) protocol to provide a basis for research. We conclude the paper with a series of performance evaluation results regarding different cryptographic and hashing schemes. Our findings clearly show that the most efficient combination of algorithms used for authentication and encryption are SHA-1 and AES respectively. Using this combination over their counterparts will lead to a considerable reduction in processing time and delay on the network, creating an efficient transaction moving towards satisfying resource constraints and security requirements.

[1]  Christos Politis,et al.  Security model for emergency real-time communications in autonomous networks , 2012, Inf. Syst. Frontiers.

[2]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[3]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[4]  Khaldoun Al Agha,et al.  A shared secret-based algorithm for securing the OLSR routing protocol , 2006, Telecommun. Syst..

[5]  Pål Spilling,et al.  Hybrid Protection of OLSR , 2006 .

[6]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[7]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[8]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[9]  Khaldoun Al Agha,et al.  Securing OLSR Routes , 2005, AINTEC.

[10]  Thomas H. Clausen,et al.  Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) , 2010, ArXiv.

[11]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[12]  Christophe Bidan,et al.  Analysis of the implicit trust within OLSR , 2007 .

[13]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .

[14]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[15]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[16]  Paul Mühlethaler,et al.  An advanced signature system for OLSR , 2004, SASN '04.

[17]  Abbas Jamalipour,et al.  SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[18]  Emmanouil A. Panaousis,et al.  Secure routing for supporting ad-hoc extreme emergency infrastructures , 2010, 2010 Future Network & Mobile Summit.

[19]  Danny Dhillon,et al.  Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs , 2006, IWCMC '06.

[20]  Huapeng Wu,et al.  A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[21]  Anne Marie Hegland,et al.  Securing QoS signaling in IP-based military Ad Hoc networks , 2008, IEEE Communications Magazine.

[22]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[23]  Oivind Kure,et al.  Secure Extension to the OLSR protocol , 2004 .

[24]  Yves Roudier,et al.  SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations , 2005, ESAS.