Validation of the OLSR routing table based on trust reasoning

Self organization characteristics of Mobile ad hoc network s (Manet) make traditional security solutions inapplicable. In Manet, an y node can be router, and can perturb the routing operation by broadcasting incorrec t topological information, making the construction of routing table, which is the primary goal of routing protocols, the more vunerable operation. Thus, in such envi ro ments, there is no guarantee that a path between two nodes would be free of misbe havior nodes, and many attacks against the routing table has the objective to p r urb the network topology by making legitimate nodes store incorrect routes, so th at traffic flows through a specific node (attacker). In this paper, we prove that each O LSR (Optimized link state routing protocol) node is able to validate the topolog y information based on trust reasonings. In our approach, when an inconsistency is detected, we guarantee that the reasoning node is able to mistrust/reject the compr ised route (which constitutes a set of nodes that include those that initiate the a ttacks), and to identify the remote nodes that are subject to attacks.

[1]  Niki Pissinou,et al.  Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.

[2]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[3]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[4]  M. Sloman,et al.  A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S , 2000 .

[5]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Rafael Timóteo de Sousa Júnior,et al.  Analysis of the implicit trust within the OLSR protocol , 2007, IFIPTM.

[7]  Ricardo Staciarini Puttini,et al.  A fully distributed IDS for MANET , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[8]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[9]  Raquel Lacuesta Gilaberte,et al.  A secure routing protocol for ad hoc networks based on trust , 2007, International Conference on Networking and Services (ICNS '07).

[10]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[11]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  M. Wang,et al.  An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[14]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[15]  Synnøve Marie Vik,et al.  THE POLITICS OF NATURE , 2009 .

[16]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[17]  Donald B. Johnson,et al.  A Note on Dijkstra's Shortest Path Algorithm , 1973, JACM.

[18]  Daniele Rao,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .