207 research outputs found

    Trust-based security for the OLSR routing protocol

    Get PDF
    International audienceThe trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR

    Energy Consumption Balancing in OLSR Ad Hoc Wireless Routing Protocol

    Get PDF
    The Mobile computer science requires many processing. Besides the communication activities, the energy consumption is one of the most critical issues as far as the batteries mobile devices are concerned. Especially, in ad hoc networks where each node is responsible to transmit data packets for the neighbour nodes. Thus, a particular wariness must be taken not only to minimize all nodes appropriate energy consumption but also to balance the batteries individual levels. Any unbalanced energy usage can, however, cause a failure on one of the overloaded nodes and thus lead to partitioning and decreasing the network lifetime. In the present paper, we first introduce the state of art the ad hoc networks and then its energy consumption, followed by a detailled description of the standard Optimized Link State Routing (OLSR) protocol. Second, we insert the energy consumption criterion QoS. With such an objective, we bring an the improvement at the heuristics of the nodes selection at multipoint relays (MPR), which represents the strongest point of the OLSR routing. Finally, we suggest three algorithms for the MPR selection process according to the energy constraints

    Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks

    Get PDF
    Increasing stability is one of the main objectives in designing routing protocols for Mobile Ad-Hoc Network (MANETS). Various research schemes have been addressed to this challenge and to support it. In fact, some papers have considered modifications to MPRs selection mechanism in OLSR. In this paper, the author proposes a new mechanism to elect stable and sustainable nodes relay between all nodes in MANETs. In this mechanism, a mobility function is used as the main selection criterion based on the calculation of the spatial relation of a node relative to its neighbor. This mechanism is applied in OLSR protocol to choose stable and supportable MPRs nodes. This mechanism significantly finds more stable MPRs and it promises QoS metrics such as lost packets and delay. Simulation results reveals a significant performance gains and it motivates further examinations to develop the mechanism in order to improve the routing protocol requirements. Performances are evaluated based on Random Waypoint model and network simulator ns3

    Towards an efficient QoS based selection of neighbors in QOLSR

    Get PDF
    International audienceOLSR is a well-known proactive protocol for wireless networks. Although very efficient by many points, it suffers from the drawbacks of not taking into account QoS metrics such as delay or bandwidth. To overcome this pitfall, some QOLSR (QoS OLSR) solutions have been designed. Nevertheless, they still provide weak performance regarding QoS metrics. In this paper, we introduce a novel and simple neighbor selection to allow routing with OLSR along quasi-optimal QoS paths

    An Enhanced MPR-Based Solution for Flooding of Broadcast Messages in OLSR Wireless ad hoc Networks

    Get PDF

    A comparative study of energy efficient routing strategies based on OLSR

    Get PDF
    Energy efficiency is a key issue in wireless ad hoc and sensor networks. In order to maximize network lifetime, several directions have been explored, among them energy efficient routing. In this report, we show how to extend the standardized OLSR routing protocol, in order to make it energy efficient. To take into account residual node energy, the native selection of multipoint relays of OLSR is changed. Three selection algorithms based on the minimum residual energy are evaluated and the best one is chosen. The OLSR extension we propose, selects the path minimizing the energy consumed in the end-to-end transmission of a flow packet and avoids nodes with low residual energy. As it has been shown that two-path routing is energy efficient, we compare this extension with a two-path source routing strategy (with different links or different nodes). An extensive performance evaluation allows us to conclude that our proposal maximizes both network lifetime and the amount of data delivered

    A Study on Preventing Node Isolation Attack in OLSR Protocol

    Get PDF
    AbstractA mobile ad hoc network (MANET) is a wireless communication system of continuously self-configuring and infrastructure-less network of mobile devices which can move independently in any direction at any time.Routing protocols is required for message exchange in MANET. The most widely used routing protocol is OLSR (Optimized Link State Routing Protocol). It is efficient in bandwidth utilization and path calculation. But it is vulnerable to many types of attacks. In this paper, we discuss about various methods used to prevent a type of Denial of Service (DoS) attack called the node isolation attack that is capable to compromise OLSR protocol
    • …
    corecore