Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
An effective intrusion detection approach for OLSR MANET protocol
NPSEC'05 Proceedings of the First international conference on Secure network protocols
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks
Computer Communications
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.03 |
Ad Hoc networks do not rely on any centralized administration or fixed network infrastructure and their nodes establish a routing structure in a self-organized way, by means of an ad hoc routing protocol such as OLSR. Ad hoc route discovery and maintenance introduce specific security problems for routing protocols to prevent, detect or respond. Solutions to secure these routing protocols using some centralized units or trusted third-parties actually constrain the self-organization of ad hoc networks. In this paper, we propose for OLSR the integration of trust reasonings into each node behavior, so as to allow a self-organized trust-based control to help nodes to detect misbehavior attacks. Our analysis of OLSR brings out the trust rules that characterize this protocol and allows us to express formally the trust-related properties that can be verified by each node to assess the correct behavior of the other nodes. Simulation of OLSR with nodes reasoning on trust allows us to demonstrate the effectiveness of our approach and to compare trust-based routing choices with the bare OLSR reachability-based choices.