Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)

Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This memorandum takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.

[1]  Anis Laouiti,et al.  Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks , 2000 .

[2]  Bu-Sung Lee,et al.  Security Threats in Ad Hoc Routing Protocols , 2009, Guide to Wireless Ad Hoc Networks.

[3]  Cédric Adjih,et al.  Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format , 2009, RFC.

[4]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[5]  Ulrich Herberg Performance Evaluation of Using a Dynamic Shortest Path Algorithm in OLSRv2 , 2010, 2010 8th Annual Communication Networks and Services Research Conference.

[6]  Philippe Jacquet,et al.  Fish eye OLSR scaling properties , 2004, Journal of Communications and Networks.

[7]  Thomas H. Clausen,et al.  Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs) , 2009, RFC.

[8]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[9]  Brian Adamson,et al.  Jitter Considerations in Mobile Ad Hoc Networks (MANETs) , 2008, RFC.

[10]  Thomas Clausen,et al.  The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .

[11]  G. Pulla,et al.  A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols , 2010 .

[12]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[13]  Ulrich Herberg Integrating Java Support for Routing Protocols in NS2 , 2008 .

[14]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[15]  Christos Douligeris,et al.  Security for Ad Hoc Networks , 2010, Handbook of Information and Communication Security.

[16]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[17]  Laurent Viennot,et al.  Complexity Results on Election of Multipoint Relays in Wireless Networks , 1998 .

[18]  Xiaohu You,et al.  The Jamming problem in IEEE 802.11‐based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement , 2009, Int. J. Commun. Syst..

[19]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[20]  Thomas H. Clausen,et al.  Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) , 2011, RFC.

[21]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[22]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[23]  Nei Kato,et al.  A study of a routing attack in OLSR-based mobile ad hoc networks , 2007, Int. J. Commun. Syst..

[24]  廖宏梓,et al.  On the Elliptic Curve Digital Signature Algorithm , 2006 .

[25]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[26]  Xiaohu You,et al.  The Jamming problem in IEEE 802.11-based mobile ad hoc networks with hidden terminals: Performance analysis and enhancement , 2009 .

[27]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[28]  Eric Allman,et al.  Email Submission Operations: Access and Accountability Requirements , 2007, RFC.