Skip to main content

Replay Attacks in Mobile Wireless Ad Hoc Networks: Protecting the OLSR Protocol

  • Conference paper
Book cover Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

This paper discusses the possible effect of replay attacks on the Optimized Link State Routing protocol. It is investigated to which extent an adversary is able to achieve network control by replaying old protocol messages. Even without particular countermeasures the adversary has to overcome considerable difficulties in order to succeed. We propose a simple protection scheme based on the message sequence number and the procedures already embedded in the routing protocol. Our scheme is an alternative to replay protection based on clocks and timestamp exchange protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Mühlethaler, P., Raffo, D.: Securing the OLSR protocol. In: Paper presented at the IFIP Med-Hoc-Net, Mahdia, Tunisia (2003)

    Google Scholar 

  • Aura, T.: Strategies against Replay Attacks. In: Paper presented at the IEEE Computer Security Foundations Workshop, Rockport, Massachusetts (June 1997)

    Google Scholar 

  • Clausen, T., Jacquet, P.: RFC 3626: Optimized Link State Routing Protocol (OLSR). Mobile Ad Hoc Networking Working Group of the IETF (2003)

    Google Scholar 

  • Clausen, T.H., Jacquet, P., Viennot, L.: Investigating the Impact of Partial Topology in Proactive MANET Routing Protocols. In: Paper presented at the Wireless Personal Multimedia Communications (November 2002)

    Google Scholar 

  • Hafslund, A., Tønnesen, A., Rotvik, R.B., Andersson, J., Kure, Ø.: Secure Extension to the OLSR protocol. In: Paper presented at the OLSR Interop and Workshop, San Diego, California (2004)

    Google Scholar 

  • Jakobsson, M., Wetzel, S., Yener, B.: Stealth Attacks on Ad-Hoc Wireless Networks. In: Vehicular Technology Conference (2003) (paper presented)

    Google Scholar 

  • Malladi, S., Alves-Foss, J., Heckendorn, R.B.: On Preventing Replay Attacks on Security Protocols. In: The International Conference on Security and Management (2002) (paper presented)

    Google Scholar 

  • Royer, E.M., Melliar-Smith, P.M., Moser, L.E.: An Analysis of the Optimum Node Density for Ad hoc Mobile Networks. In: Paper presented at the IEEE International Conference on Communications, Helsinki, Finland (June 2001)

    Google Scholar 

  • Viennot, L., Jacquet, P., Clausen, T.: Analyzing Control Traffic Overhead in Mobile Ad-hoc Network Protocols versus Mobility and Data Traffic Activity. In: Paper presented at the IFIP Med-Hoc-Net, Italy (2002)

    Google Scholar 

  • Winjum, E., Kure, Ø., Spilling, P.: Trust Metric Routing in Mobile Wireless Ad Hoc Networks. In: Paper presented at the World Wireless Congress, San Francisco (May 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Winjum, E., Hegland, A.M., Kure, Ø., Spilling, P. (2005). Replay Attacks in Mobile Wireless Ad Hoc Networks: Protecting the OLSR Protocol. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics