Skip to main content
Log in

Detecting forged routing messages in ad hoc networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The effective tremendous deployment of ad hoc networks is incontestably braked by their unreliability in terms of security and quality of services. In this paper, we focus on security problems and show that despite of efforts made in the ad hoc security field, many security issues still jeopardize correct MANETs routing operation. For such threats, we propose an IDS (Intrusion Detection System) solution for which cryptographic-based solutions are ineffective. Actually, authenticated nodes legitimately present in the network are able to send faked routing messages to compromise the routing and then communication between nodes. To cope with such security attacks, we propose an IDS dedicated to the OLSR protocol and well fitted to its characteristics and operation. In addition, our IDS is implemented on all network’s nodes which act cooperatively by continually analyzing routing messages semantics. When an intrusion is detected, alerts are flooded and intruders are banished from the network. We have finally implemented this IDS and performances evaluation shows the intrusion detection effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Clausen, T., Jacquet, P., Laouati, A., Minet, P., Muhltahler, P., Qayyum, A., & Viennot, L. (2003). Optimized link state routing protocol (IETF RFC 3626).

  2. Dhillon, D., Zhu, J., Richards, J., & Randhawa, T. (2006). Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. In International wireless communications & mobile computing conference (IWCMC’06), Vancouver, British Columbia, Canada, July 3–6, 2006.

  3. Fourati, A., & Al Agha, K. (2007). An IDS first line of defense for ad hoc networks. In IEEE wireless communications and networking conference (WCNC 2007), Hong Kong, March 11–15, 2007.

  4. Fourati, A., Badis, H., & Al Agha, K. (2005). Security vulnerabilities analysis of the OLSR routing protocol. In 12th international conference on telecommunications, ICT 2005, Cape Town, South Africa, May 3–6, 2005.

  5. http://www.olsr.org.

  6. Johnson, D. B., Maltz, D. A., & Hu, Y. C. (2004). The dynamic source routing protocol for mobile ad hoc networks (DSR) (IETF Draft 10).

  7. Lacharité, Y., Wang, M., & Lamont, L. (2006). Findings on a semantically-based intrusion detection approach for olsr manet protocol. In 3rd OLSR interop workshop 2006, Tokyo, Japan, October 2–6, 2006.

  8. Li, Y., & Wei, J. (2004). Guidelines on selecting intrusion detection methods in MANET. In The 21st annual conference for information systems educators (ISECON), Rhode Island, USA, 4–7 November, 2004.

  9. Marti, S., Giuli, T., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In The sixth annual ACM/IEEE international conference on mobile computing and networking (Mobicom 2000), Boston, USA (pp. 255–265).

  10. Mishra, A., Nadkarni, K., Patcha, A., & Tech, V. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), 48–60.

    Article  Google Scholar 

  11. Perkins, C. E., & Royer, E. M. (2003). Ad hoc on-demand distance vector routing (IETF RFC 3561).

  12. Puttini, R., De Sousa, R., & Mé, L. (2004). Preventive and corrective protection for mobile ad hoc network routing protocols. Wireless on-demand network systems (WONS 2004), first IFIP TC6 working conference, Madonna di Campiglio, Italy, January 21–23, 2004.

  13. Stamouli, I., Argyroudis, P. G., & and Tewari, H. (2005). Real-time intrusion detection for ad hoc networks. In The 6th IEEE international symposium on a world of wireless mobile and multimedia networks (WoWMoM’05), Taormina, Italy, June 2005.

  14. Sun, B., Wu, K., & Pooch, U. W. (2004). Zone-based intrusion detection for mobile ad hoc. International Journal of Ad Hoc & Sensor Wireless Networks, September 2004.

  15. Zhang, Y., Lee, W., & Huang, Y. (2002). Intrusion Detection techniques for mobile wireless networks. In ACM/Kluwer mobile networks and Applications (MONET), 2002.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alia Fourati.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fourati, A., Al Agha, K. Detecting forged routing messages in ad hoc networks. Telecommun Syst 39, 205–214 (2008). https://doi.org/10.1007/s11235-008-9122-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-008-9122-0

Keywords

Navigation