An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol

被引:17
|
作者
Djahel, Soufine [1 ]
Nait-Abdesselam, Farid [1 ]
Khokhar, Ashfaq [2 ]
机构
[1] Univ Sci & Technol Lille, CNRS, UMR 8022, LIFL IRCICA, Lille, France
[2] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60607 USA
关键词
ad hoc networks; routing Protocols; OLSR; security; cooperative black hole;
D O I
10.1109/ICC.2008.524
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address the problem of cooperative black hole attack, one of the major security issues in mobile ad hoc networks. The aim of this attack is to force nodes in the network to choose hostile nodes as relays to disseminate the partial topological information, thereby exploiting the functionality of the routing protocol to retain control packets. In optimized link state routing (OLSR) protocol, if a cooperative black hole attack is launched during the propagation of topology control (TC) packets, the topology information will not be disseminated to the whole network which may lead to routing disruption. In this paper, we investigate the effects of the cooperative black hole attack against OLSR, in which two colluding MPR nodes cooperate in order to disrupt the topology discovery. Then we propose an Acknowledgment based technique that overcomes the shortcomings of the OLSR protocol, and makes it less vulnerable to such attacks by identifying and then isolating malicious nodes in the network. The simulation results of the proposed scheme show high detection rate under various scenarios.
引用
收藏
页码:2780 / 2785
页数:6
相关论文
共 25 条
  • [1] E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs
    Heydari, Vahid
    Yoo, Seong-Moo
    WIRELESS NETWORKS, 2016, 22 (07) : 2259 - 2273
  • [2] E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs
    Vahid Heydari
    Seong-Moo Yoo
    Wireless Networks, 2016, 22 : 2259 - 2273
  • [3] Detecting and avoiding wormhole attacks in optimized link state routing protocol
    Nait-Abdesselam, Farid
    Bensaou, Brahim
    Yoo, Jinkyu
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3119 - +
  • [4] Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    Mohanapriya, M.
    Krishnamurthi, Ilango
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1825 - 1833
  • [5] Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    M. Mohanapriya
    Ilango Krishnamurthi
    Arabian Journal for Science and Engineering, 2014, 39 : 1825 - 1833
  • [6] A hierarchical secure routing protocol against black hole attacks in sensor networks
    Yin, Jian
    Madria, Sanjay Kumar
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 376 - +
  • [7] A Secure Dynamic Source Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    Mohanapriya, M.
    Krishnamurthi, Ilango
    SENSOR LETTERS, 2012, 10 (08) : 1751 - 1758
  • [8] Secure Optimized Link State Routing (OLSR) Protocol Against Node Isolation Attack
    Gadekar, Sonam
    Kadam, Sujata
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 684 - 687
  • [9] MOLSR: Mobile-Agent Based Optimized Link State Routing Protocol
    El-Hajj, Wassim
    Ben Brahim, Ghassen
    Safa, Haidar
    Akkari, Maha
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 355 - 360
  • [10] Smooth Mobility and Link Reliability-Based Optimized Link State Routing Scheme for MANETs
    Li, Zhinan
    Wu, Yinfeng
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) : 1529 - 1532