Trust-based security for the OLSR routing protocol

被引:36
作者
Adnane, Asma [1 ]
Bidan, Christophe [2 ]
de Sousa Junior, Rafael Timoteo [3 ]
机构
[1] Univ Derby, Sch Comp & Math, Derby DE22 1GB, England
[2] SUPELEC, SSIR Team, F-35510 Cesson Sevigne, France
[3] Univ Brasilia, Dept Elect Engn, BR-70910900 Brasilia, DF, Brazil
关键词
Trust; Ad hoc networks; Security; Routing protocol; OLSR; HOC; REPUTATION;
D O I
10.1016/j.comcom.2013.04.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR. (C) 2013 Elsevier BM. All rights reserved.
引用
收藏
页码:1159 / 1171
页数:13
相关论文
共 36 条
[1]  
Abolhasan M., 2004, AD HOC NETW, V2, P1, DOI DOI 10.1016/S1570-8705(03)00043-X
[2]  
Adjih C., 2003, Proceedings of the 2nd IFIP Med-Hoc-Net, P25
[3]  
Adnane Asmaa, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P745, DOI 10.1109/CSE.2009.130
[4]  
Adnane A., 2008, INT WORKSH TRUST MOB, P1
[5]  
Adnane A, 2008, WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, P151
[6]  
Adnane A, 2007, INT FED INFO PROC, V238, P75
[7]  
Adnane A, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P2006
[8]  
[Anonymous], 2001, DSC2001001 SWISS FED
[9]  
[Anonymous], 1994, Formalising trust as a computational concept
[10]  
[Anonymous], P C MOB COMP NETW MO