Analysis of the Node Isolation Attack Against OLSR-based Mobile Ad Hoc Networks
- 3 August 2006
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Recent advances in wireless networking technologies have made it possible to construct a mobile ad hoc network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, they are much more vulnerable to malicious attacks than a conventional wired network. In MANET, routing plays an important role in providing connectivity for mobile nodes who are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. However, in hostile environment mobile nodes are susceptible to various types of routing attacks. This paper identifies a new routing attack, called node isolation attack, against optimized link state routing (OLSR) protocol, one of the four standard routing protocols for MANETs. We analyze in detail and demonstrate the impact of this attack in order to show the necessity for a countermeasure to guard against the attack. As a first step to defend against the attack, we present a simple technique to detect the attack and identify the source of the attackKeywords
This publication has 17 references indexed in Scilit:
- QoS Routing in OLSR with Several Classes of ServicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Mitigating malicious control packet floods in ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- An advanced signature system for OLSRPublished by Association for Computing Machinery (ACM) ,2004
- Implementing a fully distributed certificate authority in an OLSR MANETPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Packet leashes: a defense against wormhole attacks in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- The node distribution of the random waypoint mobility model for wireless ad hoc networksIEEE Transactions on Mobile Computing, 2003
- Self-organized public-key management for mobile ad hoc networksIEEE Transactions on Mobile Computing, 2003
- Secure link state routing for mobile ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Rushing attacks and defense in wireless ad hoc network routing protocolsPublished by Association for Computing Machinery (ACM) ,2003