Skip to main content

Misbehaviors Detection to Ensure Availability in OLSR

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

Abstract

In this paper, we investigate the use of Aspect-Oriented Programming (AOP) [13] in the domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability issues in Proactive routing protocols. This paper classifies the different possible attacks and examines the countermeasures to ensure availability. Our approach is based on a detection-reaction process. The reasoning followed by the detection process is built on a formal description of normal and incorrect node behaviors. This model allows us to derive security properties. These properties are woven into our implementation using the AOP. Our algorithm checks if these security properties are violated. If they are, detection of incorrect (malicious) behaviors occurs to allow the normal node to find a path without incorrect node behavior. Therefore the detector node sends to its neighborhood the detection information to allow its neighbors to avoid choosing the intruder as a node to cross to. A node chooses the path using its local diagnosis and the reputation of other nodes. Using a field in the standard control message to communicate the detections, our approach does not change the message format, so it is very easy to use and there is no overhead. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A collaboratoin between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC. The ns Manual, http://www.isi.edu/nsnam/ns/doc/index.html

  2. Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P., Raffo, D.: Securing the OLSR protocol. In: Med-Hoc-Net 2003. 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop, Mahdia, Tunisia (June 25–27, 2003)

    Google Scholar 

  3. Bhargava, S., Agrawal, D.P.: Security enhancements in aodv protocol for wireless ad hoc networks. In: VTC 2001 Fall, vol. 4, pp. 214–347 (2001)

    Google Scholar 

  4. Clausen, T., Jacquet, P. (eds.): Optimized Link State Routing protocol (OLSR) (2003) RFC 3626, http://www.olsr.org/

  5. Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In: ARES, Vienna, Austria, IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

  6. Cuppens, F., Cuppens-Boulahia, N., Ramard, T.: Availability Enforcement by Obligations and Aspects Identification. In: ARES, Vienna, Austria (2006)

    Google Scholar 

  7. Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Nomad: A Security Model with Non Atomic Actions and Deadlines. In: The computer security foundations workshop (CSFW), Aix en Provence, France (2005)

    Google Scholar 

  8. Dijkstra, E.W: A note of two problems in connection with graphs. Sumerisclie Mathematik 1, 269–271 (1959)

    Article  MATH  MathSciNet  Google Scholar 

  9. Bovet, D.P., Cesati, M.: Understanding the Linux Kernel. O’Reilly (2003)

    Google Scholar 

  10. Purdy, G.N.: Linux Iptables Pocket Reference. O’Reilly (2004)

    Google Scholar 

  11. Hong, F., Hong, L., Fu, C.: Secure OLSR. In: AINA 2005. 19th IEEE International Conference on Advanced Information Networking and Applications, Tamkang University, Taiwan (March 28-30, 2005)

    Google Scholar 

  12. Isida, S., Ando, E., Fukuzawa, Y.: Secure routing functions for OLSR protocol. In: 2005 OLSR Interop and Workshop, Palaiseau, France (July 28–29, 2005)

    Google Scholar 

  13. Kiczales, G.: Aspect-oriented programming. ACM Comput. Surv., 28(4es) (1996)

    Google Scholar 

  14. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)

    Article  Google Scholar 

  15. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. Mobile Computing and Networking, 255–265 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cuppens, F., Cuppens-Boulahia, N., Ramard, T., Thomas, J. (2007). Misbehaviors Detection to Ensure Availability in OLSR. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics