671 research outputs found

    Trust-based security for the OLSR routing protocol

    Get PDF
    International audienceThe trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    VANET addressing scheme incorporating geographical information in standard IPv6 header

    Get PDF

    Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks

    Get PDF
    This dissertation focuses on the development of routing algorithms for secure and trusted routing in wireless ad hoc and sensor network. The first paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivability of the wireless network...The second paper analyzes both OLSR and TLR in terms of survivability and reliability to emphasize the improved performance of the network in terms of lifetime and proper delivery of data...The third paper proposes a statistical reputation model that uses the watchdog mechanism to observe the cooperation of the neighboring nodes...The last paper presents the results of the hardware implementation of Energy-Efficient Hybrid Key Management --Abstract, page iv

    Performance Analysis between OLSR and FSR Protocols under Black Hole Attack Using FPGA

    Get PDF
    Security is an important part of wireless ad hoc network or mobile ad hoc network. A mobile ad hoc network (MANET) is an infrastructure less category of wireless network. Routing protocols in Mobile ad hoc network is divided into three categories, Reactive (also known as on demand) routing protocol, Proactive (also known as table driven) routing protocol and Hybrid protocol. Security is an important part in MANET because when we send data source node to destination node in mobile ad hoc network, we want protection in path between source to destination and complete transfer data packet between source node to destination node. In this research paper we use two proactive routing protocol known as OLSR (Optimized Link state Routing) Protocol and FSR (Fisheye State Routing) Protocol. OLSR is a flat routing and Unipath protocol based on multipoint relay not multipath. FSR is a hierarchical routing and multipath protocol based on multiple paths. In this research work we check the performance of these two protocols under five different performance matrices known as Packet delivery ratio (PDR), Packet loss (PL), Average end to end delay (AEED), Normalized Routing load (NRL) and Throughput on black hole attack. Black hole attack is an active attack, in this attack attacker node absorbs the data packet and give the fake reply. In this research paper we analysis the performance two protocol one is unipath known as OLSR and second is Multipath known as FSR under Black hole Attack. The performance of FSR is better than OLSR, because OLSR is unipath and maximum data packet is absorbs in OLSR single path. FSR is better because FSR is Multipath and minimum data packet is absorbs in FSR multi path

    Security Verification of Secure MANET Routing Protocols

    Get PDF
    Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their security properties. Previous research focuses on verifying secure, reactive, accumulation-based routing protocols. An improved methodology and framework for secure MANET routing protocol verification is proposed which includes table-based and proactive protocols. The model checker, SPIN, is selected as the core of the secure MANET verification framework. Security is defined by both accuracy and availability: a protocol forms accurate routes and these routes are always accurate. The framework enables exhaustive verification of protocols and results in a counter-example if the protocol is deemed insecure. The framework is applied to models of the Optimized Link-State Routing (OLSR) and Secure OLSR protocol against five attack vectors. These vectors are based on known attacks against each protocol. Vulnerabilities consistent with published findings are automatically revealed. No unknown attacks were found; however, future attack vectors may lead to new attacks. The new framework for verifying secure MANET protocols extends verification capabilities to table-based and proactive protocols
    • …
    corecore