A shared secret-based algorithm for securing the OLSR routing protocol

被引:13
|
作者
Fourati, A [1 ]
Al Agha, K
机构
[1] Univ Paris 11, LRI, IRIT, CRISTAL, Paris, France
[2] Univ Paris 11, LRI, INRIA, Paris, France
关键词
ad hoc; OLSR routing; security; control messages integrity; threshold cryptography;
D O I
10.1007/s11235-006-6521-y
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The strongest feature of ad hoc networks is its capability to be rapidly deployed anywhere and anytime without relying on a pre-existing infrastructure. From there, ad hoc networks offer the advantages to be auto-organized, ubiquitous, dynamic and completely autonomous. As a counter part, securing them becomes a more difficult task, especially because of the absence of centralized entities in the network. Inevitably, the security problem presents currently a hot topic raising more and more challenges within industrials and researchers, and many interesting securing solutions were meanwhile proposed, omitting however to suit to ad hoc networks characteristics and therefore disadvantaging them. In this paper, we propose a securing scheme for the OLSR routing protocol based on the secret sharing idea. We initially expose the general characteristics and the security problems related to ad hoc routing protocols. We then address the security requirements of ad hoc routing protocols and the security requirements we focus on. Finally, we define our completely and distributed securing algorithm based on threshold cryptography. A primary main conception objective being to suit as much as possible to ad hoc networks characteristics by avoiding as much as possible assumptions contradictory with the auto-organized and dynamic nature of ad hoc networks. Simulation results depict the additional delay due to security enhancements. Results show that this delay stills suitable to OLSR routing specifications.
引用
收藏
页码:213 / 226
页数:14
相关论文
共 50 条
  • [1] A shared secret-based algorithm for securing the OLSR routing protocol
    Alia Fourati
    Khaldoun Al Agha
    Telecommunication Systems, 2006, 31 : 213 - 226
  • [2] Securing the Multipath Extension of the OLSR Routing Protocol
    Shcherba, Evgeny V.
    Litvinov, George A.
    Shcherba, Maria V.
    2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,
  • [3] Shared Secret-based Steganography for Protecting Medical Data
    Ahmad, Tohari
    Studiawan, Hudan
    Ahmad, Hafidh Sholihuddin
    Ijtihadie, Royyana M.
    Wibisono, Waskitho
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), 2014, : 87 - 92
  • [4] Node Discovery Algorithm Based Multipath OLSR Routing Protocol
    Sun Xuekang
    Gu Wanyi
    Xiao Xingquan
    Xu Baocheng
    Guo Zhigang
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 139 - 142
  • [5] SHARED RELAY VEHICLESELETION STRATEGY USING ME F-MPR ALGORITHM BASED ON OLSR ROUTING PROTOCOL
    Zhang, LinLiang
    Wang, Wei
    2016 IEEE CHINESE GUIDANCE, NAVIGATION AND CONTROL CONFERENCE (CGNCC), 2016, : 517 - 523
  • [6] Optimal MPR Set Selection Algorithm Based on OLSR Routing Protocol
    Dong Siyu
    Zhang Hong
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 749 - 754
  • [7] Parameters Tuning of OLSR Routing Protocol with Metaheuristic Algorithm for VANET
    Bandi, Anusha
    Chandrashekhar, B. N.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1207 - 1212
  • [8] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [9] The fuzzy based QMPR selection for OLSR routing protocol
    Kots, Ashish
    Kumar, Manoj
    WIRELESS NETWORKS, 2014, 20 (01) : 1 - 10
  • [10] Efficient Clustering based OLSR Routing Protocol for VANET
    Mehra, Ruchi
    Bali, Rasmeet S.
    Kaur, Prabhsharan
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,