Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation

被引:1
|
作者
Schweitzer, Nadav [1 ,2 ]
Cohen, Liad [1 ]
Dvir, Amit [1 ]
Stulman, Ariel [2 ]
机构
[1] Ariel Univ, Ariel Cyber Innovat Ctr, Dept Comp Sci, Jerusalem, Israel
[2] Jerusalem Coll Technol, Dept Comp Sci, Jerusalem, Israel
关键词
Node isolation; Ad -hoc networks; manet; ROUTING PROTOCOL; HOC;
D O I
10.1016/j.adhoc.2023.103192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (manets) are self-creating, self-configuring, self-healing, decentralized adaptive networks. The Optimized Link State Routing protocol (olsr) is one of four base routing protocols for use in ad hoc networks. manet's routing protocols, however, are vulnerable to various attacks. In this paper we introduce persuasive, a new, sophisticated and devastating node isolation attack variant against the olsr protocol. This attack allows for an attacker model with enhanced capabilities. We then present a novel technique to mitigate persuasive. The technique guarantees protection for all feasible topologies, incuring only local (centered around the attacker) and relatively-low overhead, independent of the network's topology. Our new protection mechanism does not disclose its activity to the attacker, and does not impose any network overhead if an attack is not launched. The novelty of the current approach is rooted in the fact that only inherent capabilities of the olsr protocol are used. This allows for quiet discovery of the adversary, and easy integration with deployed systems. We simulate persuasive and its mitigation with ns3, comparing it with several state-of-theart protection alternatives. We show that launching persuasive in a dynamic network while our mitigation mechanism is activated, will not only fend off the attack with success rates running between 93% for small networks and 100% for larger ones, but also enhance the victim's connectivity. It is shown that the average end-to-end delay incurred is also better than existing alternatives, and only slightly worse than native olsr (without any protection).
引用
收藏
页数:8
相关论文
共 25 条
  • [1] Analysis of the node isolation attack against OLSR-based mobile ad hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Kato, Nei
    Nemoto, Yoshiaki
    Jamalipour, Abbas
    [J]. ISCN '06: PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORKS, 2006, : 30 - +
  • [2] Routing anomaly detection in OLSR-based MANETs
    Gohargazi, H.
    Jalili, S.
    Rahmanimanesh, M.
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2015, 13 (03) : 276 - 298
  • [3] Addressing Node Isolation Attack in OLSR Protocol
    Shivanakar, Balaji S.
    Thorat, Sandeep A.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1013 - 1019
  • [4] A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Kato, Nei
    Nemoto, Yoshiaki
    Jamalipour, Abbas
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [5] A study of a routing attack in OLSR-based mobile ad hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Kato, Nei
    Jamalipour, Abbas
    Nemoto, Yoshiaki
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (11) : 1245 - 1261
  • [6] On the Prevention of Collusion Attack in OLSR-based Mobile Ad hoc Networks
    Babu, M. N. Kishore
    Franklin, A. Antony
    Murthy, C. Siva Ram
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 96 - 101
  • [7] A Study on Preventing Node Isolation Attack in OLSR Protocol
    James, Jefin Liza
    Thomas, Bino
    [J]. 1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 349 - 355
  • [8] Efficient Attacker Node(s) Detection and Isolation Schemes in MANETs OLSR Protocol
    Regassa, Dereje
    Yeom, Heon Young
    Son, Yongseok
    [J]. 36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 7 - 12
  • [9] Mitigation and performance evaluation Mechanism for Selfish Node Attack in MANETs
    Pai, Karthik B. H.
    Nagesh, H. R.
    Chiplunkar, Niranjan N.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [10] Security for Node Isolation Attack on OLSR by Modifying MPR Selection Process
    Malik, Devcsh
    Mahajan, Krishna
    Rizvi, M. A.
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & SOFT COMPUTING (ICNSC), 2014, : 102 - 106