Detecting Attacks in QoS-OLSR Protocol

被引:0
|
作者
Sanadiki, Hiba [1 ]
Otrok, Hadi [2 ]
Mourad, Azzam [1 ]
Robert, Jean-Marc [3 ]
机构
[1] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[2] Khalifa Univ Sci Technol & Res, Dept ECE, Abu Dhabi, U Arab Emirates
[3] Ecole Technol Super, Dept Genie Logiciel & TI, Montreal, PQ, Canada
关键词
MANET; Identity Spoofing; Wormhole; Posterior Belief; Watchdogs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service (QoS) of the nodes is considered during the selection of the multipoint relays (MPRs) nodes. In this work, we identify two attacks that can be launched against the QoS-OLSR protocol: Identity spoofing attack, and wormhole attack. Watchdogs are used to detect the attacks performed by malicious nodes. As a solution, we propose to improve the watchdogs' detection by (1) using cooperative watchdog model and (2) adding the posterior belief function using Bayes' rule to the watchdog model. Simulation results show that the use of the Bayes' rule function along with the cooperative watchdog model improves the detection rate and reduces the false positives.
引用
收藏
页码:1126 / 1131
页数:6
相关论文
共 50 条
  • [21] Evaluation of SIP Signalling and QoS for VoIP Over OLSR MANET Routing Protocol
    Alshamrani, Mazin
    Cruickshank, Haitham
    Sun, Zhili
    Elmasri, Basil
    Fami, Vahid
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 699 - 706
  • [22] On Lightweight Intrusion Detection: Modeling and Detecting Intrusions Dedicated to OLSR Protocol
    Alattar, Mouhannad
    Sailhan, Francoise
    Bourgeois, Julien
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [23] Replay attacks in mobile wireless ad hoc networks: Protecting the OLSR protocol
    Winjum, E
    Hegland, AM
    Kure, O
    Spilling, P
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 471 - 479
  • [24] Fuzzy QoS Based OLSR Network
    Maheswari, G. Uma
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2011, 3 (01) : 50 - 55
  • [25] A Novel Method for Detecting Attacks Towards the SIP Protocol
    Callegari, Christian
    Garroppo, Rosario G.
    Giordano, Stefano
    Pagano, Michele
    Russo, Franco
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2009, 41 (04): : 268 - 273
  • [26] DiffServ QoS and OLSR MANET outdoor demonstration
    Sebuktekin, I.
    Yoon, B.
    Kim, B.
    Ranade, A.
    Kwon, T. J.
    Pang, M.
    Stephens, W.
    Bereschinsky, M.
    Graff, C.
    Muzzelo, L.
    Acriche, M.
    Staikos, A.
    Foresta, B.
    Chen, D.
    EIGHTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2007, : 394 - +
  • [27] An administration structure for the OLSR protocol
    Pacheco, Vinicius
    Puttini, Ricardo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 790 - 803
  • [28] QoS routing in OLSR with several classes of service
    Leguay, J
    Conan, V
    Friedman, T
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 420 - +
  • [29] The Secured OLSR Protocol for MANET
    Selvi, K. Tamil
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [30] Detecting Flooding Attacks in Communication Protocol of Industrial Control Systems
    Rajesh, L.
    Satyanarayana, Penke
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 396 - 401