OLSRBOOK: A PRIVACY-PRESERVING MOBILE SOCIAL NETWORK LEVERAGING ON SECURING THE OLSR ROUTING PROTOCOL

被引:1
作者
Ferrag, Mohamed Amine [1 ]
Nafa, Mehdi [1 ]
Ghanmi, Salim [1 ]
机构
[1] Badji Mokhtar Univ, Annaba, Algeria
来源
LEVERAGING TECHNOLOGY FOR LEARNING, VOL II | 2012年
关键词
Social networks; Mobile Ad Hoc Networks; OLSR; MD5; RSA; Cryptography;
D O I
10.5682/2066-026X-12-113
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Social networking mobile Ad Hoc have no centralized infrastructure, so it is difficult to provide authentication services. Much work is ongoing and no complete solution to secure mobile ad hoc networks against attack has been made to date. This problem remains a major problem facing today's researchers in the field of ad hoc networks. Through this article, we proposed a security scheme for mobile ad hoc social networks where OLSR is the routing protocol. We have chosen the OLSR routing protocol because it is the most widely used ad hoc community. In general the attacker can delete, modi), copy control messages to send false messages. Our scheme consists of detecting the type of attack, the checks and then ends with alert the nodes of mobile social network These three elements is based on the addition of five messages " Hreq, Hrep, HAlert, Probing and ACKprob" in the OLSR protocol. For the exchange of a package of Hreq, Hrep and HAlert; and to provide authentication as well confidentiality. We have proposed the dual use of public key encryption; the message will be decrypted only by the true recipient and to ensure safe exchange of a package of Probing and ACKprob, we proposed an architecture through the use of RSA and MD5 to sign messages. The proposed solution is easy to deploy and requires no time synchronization or location information nor does it require any special equipment or complex calculation.
引用
收藏
页码:133 / 139
页数:7
相关论文
共 27 条
[1]   Impact of denial of service attacks on ad hoc networks [J].
Aad, Imad ;
Hubaux, Jean-Pierre ;
Knightly, Edward W. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (04) :791-802
[2]  
[Anonymous], 2 ANN PKI RES WORKSH
[3]  
[Anonymous], ACM SIGCOMM
[4]  
[Anonymous], 2008, P 1 WORKSH ONL SOC N
[5]  
Awerbuch B., 2002, WISE 02, P21
[6]  
Bhaskar R, 2007, NEW TECHN MOB SEC NT
[7]  
BUCHEGGER S, 2009, SOCIAL NET SYS
[8]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[9]  
Chen L, 2006, IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, P887
[10]   Identity based authenticated key agreement protocols from pairings [J].
Chen, LQ ;
Kudla, C .
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, :219-233