Collusion attack resistance through forced MPR switching in OLSR

Collusion Attack is an attack against Mobile Ad Hoc Networks and is based on Optimised Link State Routing (OLSR) Protocol. In this attack, two attacking nodes collude to prevent routes to a target node from being established in the network. Packet Delivery Ratio (PDR) of nodes 2-hops away from the victim drops to 0%. Multi Point Relay (MPR) selection process in OLSR is exploited to achieve route denial. In this paper, we propose a novel attack resistant method named Forced MPR Switching OLSR (FMS-OLSR), in which, whenever a node observes symptoms of the attack, it temporarily blacklists potential attackers. This forces recomputation of its MPR set, thus, avoiding the attack. Simulation results on ns-3 show that FMS-OLSR is resistant to Collusion Attacks and incurs only a minimal penalty on network performance.

[1]  Soufiene Djahel,et al.  Defending against packet dropping attack in vehicular ad hoc networks , 2008, Secur. Commun. Networks.

[2]  Nei Kato,et al.  A study of a routing attack in OLSR-based mobile ad hoc networks , 2007 .

[3]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[4]  A. Antony Franklin,et al.  On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks , 2008, 2008 16th IEEE International Conference on Networks.

[5]  Nei Kato,et al.  A study of a routing attack in OLSR-based mobile ad hoc networks , 2007, Int. J. Commun. Syst..

[6]  Nei Kato,et al.  A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006 .

[7]  J. van Loon Network , 2006 .

[8]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..