On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust

被引:5
作者
de Souza Junior, R. T. [1 ]
Adnane, A. H. [2 ]
Bidan, C. [3 ]
Me, L. [3 ]
机构
[1] Univ Brasilia, UnB, BR-70910900 Brasilia, DF, Brazil
[2] Inst Rech Commun & Cybernet Nantes IRCCyN, Rennes, France
[3] Ecole Super Elect Supelec, Rennes, France
关键词
Computer network security; computational trust; intrusion detection; ad hoc networks; OLSR; NETWORKS; ALGORITHM;
D O I
10.1109/TLA.2009.5361198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to explicit the different types of trust relations between entities which exchange routing information and establish a routing infrastructure based on the OLSR protocol. One such entity assumes the other entities will behave in a particular way and the relations coming from this trust behavior are expressed in this paper using a formal language. This approach highlights the process of trust construction in OLSR and allows the analysis of trust requirements for this protocol, as well as the expression of attacks related to the betrayal of trust relations. This analysis allows the formal description of the reasoning for OLSR entities to have a protective mistrust behavior when acting based on trust relations.
引用
收藏
页码:594 / 602
页数:9
相关论文
共 50 条
  • [31] Distributed MA-IDDPG-OLSR based stable routing protocol for unmanned aerial vehicle ad-hoc network
    Zeng, Youjun
    Zhou, Jie
    Liu, Youjiang
    Cao, Tao
    Yang, Dalong
    Liu, Yu
    Shi, Xianhua
    IET COMMUNICATIONS, 2024, 18 (08) : 503 - 522
  • [32] Interference-aware QoS OLSR for mobile ad-hoc network routing
    Nguyen, DQ
    Minet, P
    Sixth International Conference on Software Engineerng, Artificial Intelligence, Networking and Parallel/Distributed Computing and First AICS International Workshop on Self-Assembling Wireless Networks, Proceedings, 2005, : 428 - 435
  • [33] The comparison and analysis of ad-hoc routing protocols based on energy and the modification of the OLSR
    Feng, Chunkang
    Zhou, Youling
    Du, Wencai
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 883 - 887
  • [34] A reliable hierarchical routing protocol in ad hoc networks
    Wu J.
    Gu G.
    Ji Z.
    Hou G.
    Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (10): : 1006 - 1012
  • [35] Proposed Protocol for Secured Routing in Ad hoc Networks
    Kush, Ashwani
    Hwang, C. Jinshong
    IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 76 - 81
  • [36] Enhanced AODV Routing Protocol for Ad hoc Networks
    Agarwal, Khushboo
    Awasthi, Lalit Kumar
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 79 - 83
  • [37] Smart data packet ad hoc routing protocol
    Amin, Saman Hameed
    Al-Raweshidy, H. S.
    Abbas, Rafed Sabbar
    COMPUTER NETWORKS, 2014, 62 : 162 - 181
  • [38] CLUSTERED (HIERARCHICAL) AD HOC ROUTING PROTOCOL (CARP)
    Al-Sharaa, Buthayna
    Bataineh, Sameer
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 597 - 604
  • [39] An active source routing protocol for ad hoc networks
    Ren, XW
    Wang, HY
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 690 - 693
  • [40] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 9023 - 9030