On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust

被引:5
作者
de Souza Junior, R. T. [1 ]
Adnane, A. H. [2 ]
Bidan, C. [3 ]
Me, L. [3 ]
机构
[1] Univ Brasilia, UnB, BR-70910900 Brasilia, DF, Brazil
[2] Inst Rech Commun & Cybernet Nantes IRCCyN, Rennes, France
[3] Ecole Super Elect Supelec, Rennes, France
关键词
Computer network security; computational trust; intrusion detection; ad hoc networks; OLSR; NETWORKS; ALGORITHM;
D O I
10.1109/TLA.2009.5361198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of this paper is to explicit the different types of trust relations between entities which exchange routing information and establish a routing infrastructure based on the OLSR protocol. One such entity assumes the other entities will behave in a particular way and the relations coming from this trust behavior are expressed in this paper using a formal language. This approach highlights the process of trust construction in OLSR and allows the analysis of trust requirements for this protocol, as well as the expression of attacks related to the betrayal of trust relations. This analysis allows the formal description of the reasoning for OLSR entities to have a protective mistrust behavior when acting based on trust relations.
引用
收藏
页码:594 / 602
页数:9
相关论文
共 50 条
  • [41] A New Routing Protocol for Mobile Ad Hoc Networks
    Rajeswari, S.
    Venkataramani, Y.
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 112 - +
  • [42] Reliable routing in wireless ad hoc networks: The virtual routing protocol
    Albini, Luiz Carlos P.
    Caruso, Antonio
    Chessa, Stefano
    Maestrini, Piero
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2006, 14 (03) : 335 - 358
  • [43] Adaptive routing protocol for mobile ad hoc networks
    Ruperez Canas, Delfin
    Garcia Villalba, Luis Javier
    Sandoval Orozco, Ana Lucila
    Kim, Tai-Hoon
    COMPUTING, 2014, 96 (09) : 817 - 827
  • [44] An Efficient Routing Protocol for Ad-Hoc Networks
    Kumar, Chiranjeev
    Tyagi, Neeraj
    Tripathi, Rajeev
    Kumar, M. Lakshmi Prasanth
    Sharma, Dhirendra Kumar
    Biswash, Sanjay Kumar
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 11 - +
  • [45] A Trust Routing Protocol Based on D-S Evidence Theory in Mobile Ad Hoc Network
    Chen, Yuan
    Ma, Lin
    Zheng, Min
    Yu, Kai
    2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 786 - 790
  • [46] Reliable Routing in Wireless Ad Hoc Networks: The Virtual Routing Protocol
    Luiz Carlos P. Albini
    Antonio Caruso
    Stefano Chessa
    Piero Maestrini
    Journal of Network and Systems Management, 2006, 14 : 335 - 358
  • [47] Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    Mohanapriya, M.
    Krishnamurthi, Ilango
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (03) : 1825 - 1833
  • [48] A multicast routing protocol for ad-hoc networks
    Garcia-Luna-Aceves, JJ
    Madruga, EL
    IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 784 - 792
  • [49] Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    M. Mohanapriya
    Ilango Krishnamurthi
    Arabian Journal for Science and Engineering, 2014, 39 : 1825 - 1833
  • [50] RESA-OLSR: RESources-Aware OLSR-based routing mechanism for mobile ad-hoc networks
    Romanik, Janusz
    Krasniewski, Adam
    Golan, Edward
    2016 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2016,