Detecting Attacks in QoS-OLSR Protocol

被引:0
|
作者
Sanadiki, Hiba [1 ]
Otrok, Hadi [2 ]
Mourad, Azzam [1 ]
Robert, Jean-Marc [3 ]
机构
[1] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
[2] Khalifa Univ Sci Technol & Res, Dept ECE, Abu Dhabi, U Arab Emirates
[3] Ecole Technol Super, Dept Genie Logiciel & TI, Montreal, PQ, Canada
关键词
MANET; Identity Spoofing; Wormhole; Posterior Belief; Watchdogs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service (QoS) of the nodes is considered during the selection of the multipoint relays (MPRs) nodes. In this work, we identify two attacks that can be launched against the QoS-OLSR protocol: Identity spoofing attack, and wormhole attack. Watchdogs are used to detect the attacks performed by malicious nodes. As a solution, we propose to improve the watchdogs' detection by (1) using cooperative watchdog model and (2) adding the posterior belief function using Bayes' rule to the watchdog model. Simulation results show that the use of the Bayes' rule function along with the cooperative watchdog model improves the detection rate and reduces the false positives.
引用
下载
收藏
页码:1126 / 1131
页数:6
相关论文
共 50 条
  • [41] Optimized flooding and interference-aware qos routing in OLSR
    Nguyen, DQ
    Minet, P
    CHALLENGES IN AD HOC NETWORKING, 2006, 197 : 61 - +
  • [42] 基于OLSR的QoS路由新方案
    栾玉洁
    于宏毅
    计算机工程与应用, 2006, (06) : 164 - 167
  • [43] Addressing Node Isolation Attack in OLSR Protocol
    Shivanakar, Balaji S.
    Thorat, Sandeep A.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1013 - 1019
  • [44] Intelligent OLSR Routing Protocol Optimization for VANETs
    Toutouh, Jamal
    Garcia-Nieto, Jose
    Alba, Enrique
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (04) : 1884 - 1894
  • [45] New efficient mechanisms to secure OLSR protocol
    Ayad, Khadidja
    Bouabana-Tebibel, Thouraya
    2012 INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2012, : 46 - 51
  • [46] On the Robustness of the OLSR Protocol Under Unwanted Interference
    Salmanian, Mazda
    Brown, J. David
    Li, Ming
    Willink, Tricia
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 563 - 568
  • [47] Optimization on OLSR protocol for lower routing overhead
    Xue, Yong
    Jiang, Hong
    Hu, Hui
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, 2008, 5009 : 723 - 730
  • [48] Securing the Multipath Extension of the OLSR Routing Protocol
    Shcherba, Evgeny V.
    Litvinov, George A.
    Shcherba, Maria V.
    2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,
  • [49] A Weighted Approach for MPR Selection in OLSR Protocol
    Chandana, Ritu
    Jain, Sweta
    Kumar, Abhijit
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 38 - 43
  • [50] Detecting Bottlenecks on-the-fly in OLSR based MANETs
    Schweitzer, Nadav
    Stulman, Ariel
    Hirst, Tirza
    Margalit, Roy David
    Armon, Meir
    Shabtai, Asaf
    2014 IEEE 28TH CONVENTION OF ELECTRICAL & ELECTRONICS ENGINEERS IN ISRAEL (IEEEI), 2014,