Countering Control Message Manipulation Attacks on OLSR

被引:0
|
作者
Singh, Prateek Kumar [1 ]
Kar, Koushik [1 ]
机构
[1] Rensselaer Polytech Inst, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
MANETs; Blackhole Attacks; Olsr Routing; Trust Computation; SCHEME;
D O I
10.1145/3154273.3154339
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we utilize a Reputation Routing Model (RRM), which we developed in an earlier work, to mitigate the impact of three different control message based blackhole attacks in Optimized Link State Routing (OLSR) for Mobile Ad Hoc Networks (MANETs). A malicious node can potentially introduce three types of blackhole attacks on OLSR, namely TC-Blackhole attack, HELLO-Blackhole attack and TC-HELLO-Blackhole attack, by modifying its TC and HELLO messages with false information and disseminating them in the network in order to fake its advertisement. This results in node(s) diverting their messages toward the malicious node, therefore posing great security risks. Our solution reduces the risk posed by such bad nodes in the network and tries to isolate such links by feeding correct link state information to OLSR. We evaluate the performance of our model by emulating network scenarios on Common Open Research Emulator (CORE) for static as well as dynamic topologies. From our findings, it is observed that our model diminishes the effect of all three blackhole attacks on OLSR protocol in terms of packet delivery rates, especially at static and low mobility.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Topological Comparison Based Approach of Detecting Wormhole Attacks in OLSR Protocol
    Alam, Mohammad
    Chan, King-Sun
    2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2010,
  • [32] Finding Protocol Manipulation Attacks
    Kothari, Nupur
    Mahajan, Ratul
    Millstein, Todd
    Govindan, Ramesh
    Musuvathi, Madanlal
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 26 - 37
  • [33] A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks
    Petrillo, Alberto
    Pescape, Antonio
    Santini, Stefania
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 110 - 115
  • [34] Position Manipulation Attacks to Balise-Based Train Automatic Stop Control
    Wu, Yongdong
    Wei, Zhuo
    Weng, Jian
    Deng, Robert H.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) : 5287 - 5301
  • [35] Countering Code Injection Attacks with TLB and I/O Monitoring
    Ahn, Dongkyun
    Lee, Gyungho
    2010 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2010, : 370 - 375
  • [36] Countering DNS Amplification Attacks Based on Analysis of Outgoing Traffic
    Sagatov E.
    Mayhoub S.
    Sukhov A.
    Calyam P.
    Journal of Communications and Information Networks, 2023, 8 (02) : 111 - 121
  • [37] Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites
    Yagi, Takeshi
    Murayama, Junichi
    Hariu, Takeo
    Tsugawa, Sho
    Ohsaki, Hiroyuki
    Murata, Masayuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2014, E97B (01) : 76 - 86
  • [38] UNIFYING STRATEGIES AND TACTICS: A SURVIVABILITY FRAMEWORK FOR COUNTERING CYBER ATTACKS
    Zuo, Yanjun
    Panda, Brajendra
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 119 - +
  • [39] Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust
    Basan, Alexander
    Basan, Elena
    Makarevich, Oleg
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 409 - 412
  • [40] CAC-OLSR: Extending OLSR to Provide Admission Control in Wireless Mesh Networks
    da Silva Mineiro, Eduardo Pompeo
    Muchaluat-Saade, Debora Christina
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2014, 21 (03) : 223 - 237