An Improved Identity-Based Secure Mobile Ad-Hoc Network Routing Protocol

Mobile ad-hoc networks have important applications in many fields, such as battlefield environment, temporary meeting, field detection and even underground mine. The OLSR protocol is an important mobile ad-hoc network routing protocol that has become an international standard, but the initial design of the protocol lacks security considerations. Aiming at the security routing problem of OLSR protocol, some security enhancement methods have been proposed, but there are still some shortcomings in the confidentiality of message transmission and encryption efficiency. After analyzed the OLSR protocol, we proposes a security OLSR protocol based on identity-based signcryption, which uses identity-based signcryption to sign packets, so we can achieve authentication and protective the original packets been tampered. The scheme is more efficient and more secure than the existing enhancement scheme, and can guarantee the safe operation of the OLSR protocol.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  M. Mohana Priya A NOVEL TECHNIQUE FOR DEFENDING ROUTING ATTACKS IN OLSR MANET , 2010 .

[3]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[4]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[7]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[8]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[9]  Nei Kato,et al.  NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.

[10]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[11]  Brahim Bensaou,et al.  Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[12]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[13]  Hong Fa SOLSR: A Secure Link State Routing Protocol for Ad Hoc Networks , 2005 .

[14]  Huang Haiping Effective Defense System Based on the Classical Attack in the OLSR Routing Protocol , 2010 .