Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
A framework for resilient Internet routing protocols
IEEE Network: The Magazine of Global Internetworking
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Integrating trust reasonings into node behavior in olsr
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Autonomic trust reasoning enables misbehavior detection in OLSR
Proceedings of the 2008 ACM symposium on Applied computing
A novel architecture of intrusion detection system
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A trust-based IDS for the AODV protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Hi-index | 0.00 |
The Optimized Link State Routing (OLSR) protocol is a proactive Mobile Ad hoc Network (MANET) routing protocol. Security aspects have not been designed into the OLSR protocol and therefore make it vulnerable to various kinds of attacks. Recent research efforts have focused on providing authentication and encryption techniques to secure the OLSR protocol against attacks from outside intruders. A second line of defense is required to provide intrusion detection and response techniques in protecting the OLSR protocol against attacks from inside intruders. In this paper, we describe security threats to the OLSR MANET routing protocol and present an intrusion detection solution based on protocol semantics checking. Our approach is based on semantic properties that are implied in the protocol definition and specify the correct OLSR routing update behavior. Conflict checking based on semantic properties is applied in every MANET node. Any abnormal protocol semantics will trigger an intrusion alarm. While we use OLSR as an example, we argue that the presented approach can be applied to any Multi-Point Relay (MPR) proactive MANET protocol.