An advanced signature system for OLSR

  • Authors:
  • Daniele Raffo;Cédric Adjih;Thomas Clausen;Paul Mühlethaler

  • Affiliations:
  • INRIA Rocquencourt;INRIA Rocquencourt;INRIA Rocquencourt;INRIA Rocquencourt

  • Venue:
  • Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we investigate security issues related to the Optimized Link State Routing Protocol -- one example of a proactive routing protocol for MANETs. We inventory the possible attacks against the integrity of the OLSR network routing infrastructure, and present a technique for securing the network. In particular, assuming that a mechanism for routing message authentication (digital signatures) has been deployed, we concentrate on the problem where otherwise "trusted" nodes have been compromised by attackers, which could then inject false (however correctly signed) routing messages. Our main approach is based on authentication checks of information injected into the network, and reuse of this information by a node to prove its link state at a later time. We finally synthetize the overhead and the remaining vulnerabilities of the proposed solution.