Countering Control Message Manipulation Attacks on OLSR

被引:0
|
作者
Singh, Prateek Kumar [1 ]
Kar, Koushik [1 ]
机构
[1] Rensselaer Polytech Inst, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
MANETs; Blackhole Attacks; Olsr Routing; Trust Computation; SCHEME;
D O I
10.1145/3154273.3154339
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we utilize a Reputation Routing Model (RRM), which we developed in an earlier work, to mitigate the impact of three different control message based blackhole attacks in Optimized Link State Routing (OLSR) for Mobile Ad Hoc Networks (MANETs). A malicious node can potentially introduce three types of blackhole attacks on OLSR, namely TC-Blackhole attack, HELLO-Blackhole attack and TC-HELLO-Blackhole attack, by modifying its TC and HELLO messages with false information and disseminating them in the network in order to fake its advertisement. This results in node(s) diverting their messages toward the malicious node, therefore posing great security risks. Our solution reduces the risk posed by such bad nodes in the network and tries to isolate such links by feeding correct link state information to OLSR. We evaluate the performance of our model by emulating network scenarios on Common Open Research Emulator (CORE) for static as well as dynamic topologies. From our findings, it is observed that our model diminishes the effect of all three blackhole attacks on OLSR protocol in terms of packet delivery rates, especially at static and low mobility.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Modeling Message Spoofing Attacks on the OLSR Routing Protocol
    Litvinov, George
    Shcherba, Evgeny
    2019 URAL SYMPOSIUM ON BIOMEDICAL ENGINEERING, RADIOELECTRONICS AND INFORMATION TECHNOLOGY (USBEREIT), 2019, : 299 - 302
  • [2] Countering Detector Manipulation Attacks in Quantum Communication through Detector Self-testing
    Shen, Lijiong
    Kurtsiefer, Christian
    2022 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION (ECOC), 2022,
  • [3] Countering cyber attacks
    Wagner, Cynthia G.
    FUTURIST, 2007, 41 (03) : 16 - 16
  • [4] Countering Data and Control Plane Attack On OLSR Using Passive Neighbor Policing and Inconsistency Identification
    Singh, Prateek Kumar
    Kar, Koushik
    Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2019, : 19 - 28
  • [5] Redundant TC Message Senders in OLSR
    Yamada, Kenji
    Itokawa, Tsuyoshi
    Kitasuka, Teruaki
    Aritsugi, Masayoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (12) : 3269 - 3272
  • [6] Ideology and translation: Control procedures and message manipulation
    Lanza, DG
    PROCEEDINGS OF THE XIXTH INTERNATIONAL CONFERENCE ON AEDEAN (ASOCIACION ESPANOLA DE ESTUDIOS ANGLONORTEAMERICANOS), 1996, : 323 - 327
  • [7] Detecting Attacks in QoS-OLSR Protocol
    Sanadiki, Hiba
    Otrok, Hadi
    Mourad, Azzam
    Robert, Jean-Marc
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1126 - 1131
  • [8] A New Approach to Countering Ambiguity Attacks
    Sencar, Husrev T.
    Li, Qiming
    Memon, Nasir
    MM&SEC'07: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2007, 2007, : 205 - 213
  • [9] Statistically countering denial of service attacks
    Xu, Y
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 844 - 849
  • [10] Countering Beijing's Media Manipulation
    Cook, Sarah
    JOURNAL OF DEMOCRACY, 2022, 33 (01): : 116 - 130