Attacks Against OLSR : Distributed Key Management for Security

In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create spontaneously a larger network, larger than radio range, in which communication with each other is made possible by the means of routing. One routing protocol for such MANET networks is OLSR, on which this article focuses. We examine the security issues, and describe an architecture including multiple securing mechanisms. The attacks prevented by this architecture, along with details about protocols, algorithms, mechanisms and implementation details are given.

[1]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[2]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[3]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[4]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[5]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[9]  Jorji Nonaka,et al.  An Evaluation of Low Cost Hardware-assisted Internal Clock Synchronization in PC Cluster Environment , 2002, PDPTA.

[10]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[11]  Securing the OLSR protocol , 2003 .

[12]  Ratna Dutta,et al.  Pairing-based cryptography : A survey , 2004 .

[13]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[14]  Hisashi Kobayashi,et al.  Amendment to: Highly Secure and Efficient Routing , 2004 .

[15]  Philippe Jacquet,et al.  OLSR performance measurement in a military mobile ad-hoc network , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[16]  Hisashi Kobayashi,et al.  Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.

[17]  Paul Mühlethaler,et al.  An advanced signature system for OLSR , 2004, SASN '04.

[18]  Jung Hee Cheon,et al.  A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..

[19]  Danny Dhillon,et al.  Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[20]  Daniele Rao,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .

[21]  Cédric Adjih,et al.  Securing OLSR Using Node Locations , 2005 .

[22]  Anis Laouiti,et al.  Securing the OLSR routing protocol with or without compromised nodes in the network , 2005 .

[23]  Alfred Menezes,et al.  Pairing-Based Cryptography at High Security Levels , 2005, IMACC.

[24]  Crypto , 2021, Journal AWWA.