A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks

被引:0
|
作者
Kannhavong, Bounpadith [1 ]
Nakayama, Hidehisa [1 ]
Kato, Nei [1 ]
Nemoto, Yoshiaki [1 ]
Jamalipour, Abbas [2 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
[2] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
关键词
MANET; OLSR; Collusion Attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Rapid advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, MANETs are vulnerable to various kinds of attacks which aim at disrupting their routing operations. To develop a strong security scheme to protect against these attacks it is necessary to understand the possible form of attacks that may be launched. Recently, researchers have proposed and investigated several possible attacks against MANET. However, there are still unanticipated or sophisticated attacks that have not been well studied. In this paper, we present a collusion attack model against Optimized Link State Routing (OLSR) protocol which is one of the four standard routing protocols for MANETs. After analyzed the attack in detail and demonstrated the feasibility of the attack through simulations, we present a technique to detect the attack by utilizing information of two hops neighbors.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Parvinder Kaur
    Dalveer Kaur
    Rajiv Mahajan
    Wireless Personal Communications, 2017, 97 : 2939 - 2950
  • [42] Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks
    Michalas, Antonis
    Komninos, Nikos
    Prasad, Neeli R.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2011, 3 (01) : 14 - 36
  • [43] Intelligent Stealthy Attack on MAODV in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 1 - 6
  • [44] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Kaur, Parvinder
    Kaur, Dalveer
    Mahajan, Rajiv
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2939 - 2950
  • [45] Least Squares Disclosure Attack in Mobile Ad Hoc Networks
    Qin, Yang
    Huang, Dijiang
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [46] SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
    Sharma, Sheenu
    Gupta, Roopam
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2009, 4 (02): : 243 - 250
  • [47] Effects of Denial of Service Attack in Mobile Ad Hoc Networks
    易平
    周雍凯
    吴越
    柳宁
    Journal of Shanghai Jiaotong University(Science), 2009, 14 (05) : 580 - 583
  • [48] An Approach for DDoS Attack Prevention in Mobile ad hoc Networks
    Timcenko, V. V.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (06) : 150 - 153
  • [49] Effects of denial of service attack in mobile ad hoc networks
    Yi P.
    Zhou Y.-K.
    Wu Y.
    Liu N.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 (5) : 580 - 583
  • [50] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123