Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol

نویسندگان

  • Gimer Cervera
  • Michel Barbeau
  • Joaquín García
  • Evangelos Kranakis
چکیده

The Hierarchical Optimized Link State Routing (HOLSR) protocol enhances the scalability and heterogeneity of traditional OLSR-basedMobile AdHoc Networks (MANETs). It organizes the network in logical levels and nodes in clusters. In every cluster, it implements the mechanisms and algorithms of the original OLSR to generate and to distribute control traffic information. However, the HOLSR protocol was designed with no security in mind. Indeed, it both inherits, from OLSR, and adds new security threats. For instance, the existence of misbehaving nodes can highly affect important HOLSR operations, such as the cluster formation. Cluster IDentification (CID) messages are implemented to organize a HOLSR network in clusters. In every message, the hop count field indicates to the receiver the distance in hops to the originator. An attacker may maliciously alter the hop count field. As a consequence, a receiver node may join a cluster head farther away than it appears. Then, the scalability properties in a HOLSR network is affected by an unbalanced distribution of nodes per cluster. We present a solution based on the use of hash chains to protect mutable fields in CID messages. As a consequence, when a misbehaving node alters the hop count field in a CID message, the receiver nodes are able of detecting and discarding the invalid message.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Securing the OLSR routing protocol for Ad Hoc Detecting and Avoiding Wormhole Attack

A major problem facing researchers today in the field of ad hoc networks is safety and preservation of the integrity of such networks. Among the many attacks recorded in the literature, wormhole attack remains a severe attack and not completely solved, particularly in ad hoc network configuration where OLSR is used as routing protocol. In the article we have proposed a more effective method for...

متن کامل

Olsr Scaling with Hierarchical Routing and Dynamic Tree Clustering

The Internet uses hierarchical networking, for scalability and manageability reasons. However the main ad hoc routing solutions (OLSR [1], AODV [6], DSR [8], TBRPF [7]) only provide flat networking, and generally suffer important scalability issues. This paper therefore introduces a simple mechanism providing dynamic clustering with OLSR, one of the MANET routing solutions, chosen for its easy ...

متن کامل

A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks

Rapid advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, MANETs are vulnerable to various kinds of attacks which aim at disrupting their routing operations. To develop a strong security scheme to protect against these attacks it is n...

متن کامل

Discovering a Secure Path in MANET by Avoiding Black Hole Attack

In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011