SA-OLSR: Security aware optimized link state routing for mobile ad hoc networks

被引:11
|
作者
Kannhavong, Bounpadith [1 ]
Nakayama, Hidehisa [1 ]
Nemoto, Yoshiaki [1 ]
Kato, Nei [1 ]
Jamalipour, Abbas [2 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
[2] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
关键词
MANET; routing; OLSR; security extension;
D O I
10.1109/ICC.2008.283
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently Mobile Ad Hoc Network (MANET) has drawn great attention for being part of the ubiquitous network. Unlike the conventional network, MANETs have many unique features such as node resource constraint. That is why several efficient routing protocols have been proposed specifically for MANETs. Among these protocols, Optimized Link State Routing (OLSR) is one of the four important routing protocol identified by IETF. The current OLSR protocol assumes that all nodes are trusted. However, in hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. In this paper, we propose a new Security Aware Optimized Link State Routing (SA-OLSR) which is a secured version of current OLSR. Our approach is based on exchanging acknowledgement between 2-hop neighbors when the control traffic is successfully received. The main advantage of our approach is that it can protect against many sophisticated attacks such as link spoofing, colluding misrelay attack, and wormhole attack without requiring any location information as well as the knowledge of complete network topology. Our simulation results show that the proposed solution can achieve higher packet delivery ratio compared to the network using the standard OLSR in the presence of malicious nodes.
引用
收藏
页码:1464 / +
页数:2
相关论文
共 50 条
  • [1] Enhancing Security in Optimized Link State Routing Protocol for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Faouzi, Hassan
    Mouncif, Hicham
    El Hadadi, Benachir
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 107 - 116
  • [2] Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks
    Dhir, Amandeep
    Sengupta, Jyotsna
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (01): : 52 - 83
  • [3] P-OLSR: Position-based Optimized Link State Routing for Mobile Ad Hoc Networks
    Sharma, Sachin
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 237 - 240
  • [4] Energy aware proactive optimized link state routing in mobile ad-hoc networks
    Guo, Zhihao
    Malakooti, Shandi
    Sheikh, Shaya
    Al-Najjar, Camelia
    Lehman, Matthew
    Malakooti, Behnam
    APPLIED MATHEMATICAL MODELLING, 2011, 35 (10) : 4715 - 4729
  • [5] Multipath optimized link state routing for mobile ad hoc networks
    Yi, Jiazi
    Adnane, Asmaa
    David, Sylvain
    Parrein, Benoit
    AD HOC NETWORKS, 2011, 9 (01) : 28 - 47
  • [6] Bat Optimized Link State Routing Protocol for Energy-Aware Mobile Ad-Hoc Networks
    Jubair, Mohammed Ahmed
    Mostafa, Salama A.
    Muniyandi, Ravie Chandren
    Mandin, Hairulnizam
    Mustapha, Aida
    Hassan, Mustafa Hamid
    Mahmoud, Moamin A.
    Al-Jawhar, Yasir Amer
    Al-Khaleefa, Ahmed Salih
    Mahmood, Ahmed Jubair
    SYMMETRY-BASEL, 2019, 11 (11):
  • [7] Optimized link state routing protocol for ad hoc networks
    Jacquet, P
    Mühlethaler, P
    Clausen, T
    Laouiti, A
    Qayyum, A
    Viennot, L
    IEEE INMIC 2001: IEEE INTERNATIONAL MULTI TOPIC CONFERENCE 2001, PROCEEDINGS: TECHNOLOGY FOR THE 21ST CENTURY, 2001, : 62 - 68
  • [8] Secure link state routing for mobile ad hoc networks
    Papadimitratos, P
    Haas, ZJ
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 379 - 383
  • [9] An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks
    VinothKumar, K.
    Rajaram, A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (12): : 66 - 73
  • [10] Optimized Routing in Mobile Ad hoc Networks
    Kumar, Rakesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (12): : 85 - 91