2 research outputs found

    Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)

    Get PDF
    Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of ``trusted participants'', the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks -- in a certain way, provides a ``cookbook'' for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks

    Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing

    Get PDF
    When a certain gateway is connected to a significant number of mobile devices, the quality of service begins to decline. As a result, we propose that the number of mobile devices up to which a specific gateway performs well within expectations be identified, and that this number be referred to as the gateway's capacity. The capacity of each node should then be verified in the optimum gateway discovery protocol before connecting to the gateway for the best results. Trust-based systems might help protect decentralised, self-organized networks like dedicated cellular carriers and dedicated vehicle networks against insider attacks. To guard against external threats, A/V encryption and access control might be utilised. Cryptographic systems, for example, are prevention-focused
    corecore