Detecting Attacks in QoS-OLSR Protocol

被引:0
|
作者
Sanadiki, Hiba [1 ]
Otrok, Hadi [2 ]
Mourad, Azzam [1 ]
Robert, Jean-Marc [3 ]
机构
[1] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[2] Khalifa Univ Sci Technol & Res, Dept ECE, Abu Dhabi, U Arab Emirates
[3] Ecole Technol Super, Dept Genie Logiciel & TI, Montreal, PQ, Canada
关键词
MANET; Identity Spoofing; Wormhole; Posterior Belief; Watchdogs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service (QoS) of the nodes is considered during the selection of the multipoint relays (MPRs) nodes. In this work, we identify two attacks that can be launched against the QoS-OLSR protocol: Identity spoofing attack, and wormhole attack. Watchdogs are used to detect the attacks performed by malicious nodes. As a solution, we propose to improve the watchdogs' detection by (1) using cooperative watchdog model and (2) adding the posterior belief function using Bayes' rule to the watchdog model. Simulation results show that the use of the Bayes' rule function along with the cooperative watchdog model improves the detection rate and reduces the false positives.
引用
下载
收藏
页码:1126 / 1131
页数:6
相关论文
共 50 条
  • [31] An Efficient Approach for Detecting Wormhole Attacks in AODV Routing Protocol
    Thakurta, Parag Kumar Guha
    Guin, Rajeswar
    Bandyopadhyay, Subhansu
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 217 - 227
  • [32] Performance Evaluation of QoS Aware Routing in OLSR (Optimized Link State Routing Protocol) Using Genetic Algorithm
    Pushpavalli, M.
    Natarajan, A. M.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 469 - +
  • [33] Countering Control Message Manipulation Attacks on OLSR
    Singh, Prateek Kumar
    Kar, Koushik
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [34] Analysis of MPR selection in the OLSR protocol
    Nguyen, Dang
    Minet, Pascale
    21st International Conference on Advanced Networking and Applications Workshops/Symposia, Vol 2, Proceedings, 2007, : 887 - 892
  • [35] The quality factor for detecting node isolation attack in mobile ad hoc networks using OLSR protocol
    Nabou, Abdellah
    Laanaoui, Driss
    Ouzzif, Mohammed
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (04) : 197 - 204
  • [36] Mobility Support in OLSR Routing Protocol
    Fatima, Lakrami
    Najib, Elkamoun
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 804 - 812
  • [37] Tools for performance assessment of OLSR protocol
    Ikeda, Makoto
    Barolli, Leonard
    De Marco, Giuseppe
    Yang, Tao
    Durresi, Arjan
    Xhafa, Fatos
    MOBILE INFORMATION SYSTEMS, 2009, 5 (02) : 165 - 176
  • [38] Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol
    Alaiz-Moreton, Hector
    Aveleira-Mata, Jose
    Ondicol-Garcia, Jorge
    Luis Munoz-Castaneda, Angel
    Garcia, Isaias
    Benavides, Carmen
    COMPLEXITY, 2019, 2019
  • [39] Detecting and avoiding wormhole attacks in optimized link state routing protocol
    Nait-Abdesselam, Farid
    Bensaou, Brahim
    Yoo, Jinkyu
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3119 - +
  • [40] Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
    Ahutu, Ohida Rufai
    El-Ocla, Hosam
    IEEE ACCESS, 2020, 8 (08): : 63270 - 63282