Property Based Intrusion Detection to Secure OLSR

In this paper, we examine security issues related to proactive routing protocols for mobile ad-hoc networks (MANETs). Specifically, we investigate security properties of the optimized link-state routing (OLSR) protocol, a proactive routing protocol for MANETs. We analyze the possible attacks against the integrity of the network routing infrastructure, and present techniques to counter some attacks. Our main approach is based on a formal model to describe normal and incorrect node behaviors. This model allows us to derive security properties. The algorithm checks if these security properties are violated. If they are, detection occurs to allow the normal node to find a path without incorrect node behavior. Our approach does not change the message format, so it is very easy to implement the corresponding algorithm. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.

[1]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[2]  Liang Hong,et al.  Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[3]  Nora Cuppens-Boulahia,et al.  Nomad: a security model with non atomic actions and deadlines , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[4]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[5]  Jalel Ben-Othman,et al.  A Trust-Based Routing Protocol for Ad Hoc Networks , 2004, MWCN.

[6]  Oivind Kure,et al.  Secure Extension to the OLSR protocol , 2004 .

[7]  Thomas Clausen,et al.  The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .

[8]  Nora Cuppens-Boulahia,et al.  Availability enforcement by obligations and aspects identification , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[9]  O. Kure,et al.  A performance evaluation of security schemes proposed for the OLSR protocol , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[10]  Philippe Jacquet,et al.  Investigating the impact of partial topology in proactive MANET routing protocols , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.

[11]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .