On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust

The goal of this paper is to explicit the different types of trust relations between entities which exchange routing information and establish a routing infra-structure based on the OLSR protocol. One such entity assumes the other entities will behave in a particular way and the relations coming from this trust behavior are expressed in this paper using a formal language. This approach highlights the process of trust construction in OLSR and allows the analysis of trust requirements for this protocol, as well as the expression of attacks related to the betrayal of trust relations. This analysis allows the formal description of the reasoning for OLSR entities to have a protective mistrust behavior when acting based on trust relations.

[1]  Chris Hankin,et al.  A framework for security analysis of mobile wireless networks , 2006, Theor. Comput. Sci..

[2]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[3]  Sonja Buchegger,et al.  Coping With Misbehavior in Mobile Ad-hoc Networks , 2004 .

[4]  M. Wang,et al.  An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[5]  Daniele Rao,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .

[6]  Christian Damsgaard Jensen,et al.  Trust-Based Route Selection in Dynamic Source Routing , 2006, iTrust.

[7]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[8]  Pietro Michiardi,et al.  Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .

[9]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[10]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[11]  Laurent Bussard Trust establishment protocols for communicating devices , 2004 .

[12]  Donald B. Johnson,et al.  A Note on Dijkstra's Shortest Path Algorithm , 1973, JACM.

[13]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[14]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Khaldoun Al Agha,et al.  A shared secret-based algorithm for securing the OLSR routing protocol , 2006, Telecommun. Syst..

[16]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[17]  Anis Laouiti,et al.  Securing the OLSR routing protocol with or without compromised nodes in the network , 2005 .

[18]  Lea Viljanen,et al.  Towards an Ontology of Trust , 2005, TrustBus.