Skip to main content

Security Issues in Link State Routing Protocols for MANETs

  • Chapter
  • First Online:
Advances in Network Analysis and its Applications

Part of the book series: Mathematics in Industry ((MATHINDUSTRY,volume 18))

Abstract

In link state routing networks, every node has to construct a topological map through the generation and exchange of routing information. Nevertheless, if a node misbehaves then the connectivity in the network is compromised. The proactive Optimized Link State Routing (OLSR) protocol has been designed exclusively for Mobile Ad Hoc Networks (MANETs). The core of the protocol is the selection of Multipoint Relays (MPRs) as an improved flooding mechanism for distributing link state information. This mechanism limits the size and number of control traffic messages. As for several other routing protocols for MANETs, OLSR does not include security measures in its original design. Besides, OLSR has been extended to address a number of problems in MANETs. For example, Hierarchical OLSR (HOLSR) has been proposed to address scalability and Multipath OLSR (MP-OLSR) to address fault tolerance. However, these OLSR extensions can be affected either by inheriting or adding new security threats. In this chapter, we present a review of security issues and countermeasures in link state routing protocols for MANETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. R. Abdellaoui and J.-M. Robert. SU-OLSR: A new solution to thwart attacks against the OLSR protocol. In 4th Conference on Security in Network Architectures and Information Systems (SAR-SSI), pages 239–245, Luchon, France, June 22–26, 2009.

    Google Scholar 

  2. C. Adjih, T. Clausen, A. Laouiti, P. Muhlethaler, and D. Raffo. Securing the OLSR routing protocol with or without compromised nodes in the network. Technical Report, INRIA RR-5494, HIPERCOM project, INRIA Rocquencourt, February 2005.

    Google Scholar 

  3. A. Adnane, R.T. de Sousa Jr., C. Bidan, and L. Me. Autonomic trust reasoning enables misbehavior detection in OLSR. In SAC’08: Proceedings of the 2008 ACM symposium on Applied computing, pages 2006–2013, New York, NY, USA, 2008. ACM.

    Google Scholar 

  4. E. Baccelli. OLSR scaling with hierarchical routing and dynamic tree clustering. In IASTED International Conference on Networks and Communication Systems (NCS), Chiang Mai, Thailand, March 2006.

    Google Scholar 

  5. E. Baccelli. OLSR trees: A simple clustering mechanism for OLSR. In Challenges in Ad Hoc Networking, IFIP International Federation for Information Processing, vol. 197, pages 265–274, 2006.

    Google Scholar 

  6. H. Badis and K. Al Agha. QOLSR multi-path routing for mobile ad hoc networks based on multiple metrics: bandwidth and delay. In Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th, vol. 4, pages 2181–2184, May 2004.

    Google Scholar 

  7. G. Cervera, M. Barbeau, J. Garcia-Alfaro, and E. Kranakis. Mitigation of topology control attacks in OLSR networks. In 5th International Conference on Risks and Security of Internet and Systems (CRISIS 2010), Jean-Marc Robert, editor, pages 81–88, Montreal, Canada, October 10–13, 2010.

    Google Scholar 

  8. G. Cervera, M. Barbeau, J. Garcia-Alfaro, and E. Kranakis. Mitigation of flooding disruption attacks in HOLSR networks. In 9th Annual Conference on Communication Networks and Services Research Conference (CNSR 2011), pages 167–174, 10.1109/CNSR.2011.32. Ottawa, ON, Canada, May 2–5 2011.

    Google Scholar 

  9. G. Cervera, M. Barbeau, J. Garcia-Alfaro, and E. Kranakis. Preventing the Cluster Formation Attack Against the Hierarchical OLSR Protocol: Invited Talk. In proceedings of 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS 2011), Paris, France, May 12–13 2011. Springer LNCS.

    Google Scholar 

  10. T. Clausen and P. Jacquet. Optimized link state routing protocol (OLSR), RFC3626. IETF Internet Draft, Available via http://www.ietf.org/rfc/rfc3626.txt, October 2003.

  11. T. Clausen, C. Dearlove and P. Jacquet. Optimized link state routing protocol version 2 (OLSRv2), RFC3666 ,Work in progress. Project Hipercom, INRIA, Internet Draft, http://bgp.potaroo.net/ietf/all-ids/draft-ietf-manet-olsrv2-13.txt, November 2011.

  12. T. Clausen and C. Dearlove. RFC5497: Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs), std. track, http://www.ietf.org/rfc/rfc5497.txt.

  13. T. Clausen, C. Dearlove, and B. Adamson. RFC5148: Jitter Considerations in Mobile Ad Hoc Networks (MANETs), informational, http://www.ietf.org/rfc/rfc5148.txt.

  14. T. Clausen, C. Dearlove, and J. Dean. I-D: MANET Neighborhood Discovery Protocol (NHDP), work in progress.

    Google Scholar 

  15. T. Clausen, C. Dearlove, J. Dean, and C. Adjih. RFC5444: Generalized mobile ad hoc network (manet) packet/message format, std. track, http://www.ietf.org/rfc/rfc5444.txt.

  16. T. Clausen and U. Herberg. Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2). In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, pages 628–633, 2010.

    Google Scholar 

  17. T. Clausen, U. Herberg, and J. Milan. Digital signatures for admittance control in the optimized link state routing protocol version 2. Research Report RR-7216, INRIA, February 2010.

    Google Scholar 

  18. F. Cuppens, N. Cuppens-Boulahia, S. Nuon, and T. Ramard. Property based intrusion detection to secure OLSR. In ICWMC ’07: Proceedings of the Third International Conference on Wireless and Mobile Communications, pages 52–59, Washington, DC, USA, 2007. IEEE Computer Society.

    Google Scholar 

  19. U. Herberg and T. Clausen. Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2). International Journal of Network Security & Its Applications (IJNSA), vol. 2(2), 2010.

    Google Scholar 

  20. F. Hong, L. Hong, and C. Fu. Secure OLSR. International Conference on Advanced Information Networking and Applications (AINA 2005), vol. 1, pages 713–718, Taipei, Taiwan, March 2005.

    Google Scholar 

  21. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. In IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings, pages 62–68. Lahore University of Management Sciences, Pakistan, December 2001.

    Google Scholar 

  22. A. R. Khakpour, M. Laurent-Maknavicius, and H. Chaouchi. WATCHMAN: An overlay distributed AAA architecture for mobile ad hoc networks. In ARES ’08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, pages 144–152, Washington, DC, USA, March 2008. IEEE Computer Society.

    Google Scholar 

  23. M. Kun, Y. Jingdong, and R. Zhi. The research and simulation of multipath-OLSR for mobile ad hoc network. In Communications and Information Technology, 2005. ISCIT 2005. IEEE International Symposium on, vol. 1, pages 540–543, October 2005.

    Google Scholar 

  24. J. Moy. Open Shortest Path First (OSPF) version 2, RFC2328. IETF Internet Draft, http://www.ietf.org/rfc/rfc2328.txt, April 1998.

  25. D. Raffo. Security schemes for the OLSR protocol for ad hoc networks. PhD thesis, LUniversité Paris 6 - Pierre et Marie Curie, INRIA Roquencourt, September 2005.

    Google Scholar 

  26. D. Raffo, C. Adjih, T. Clausen, and P. Muhlethaler. Securing OLSR using node locations. In Proceedings of 2005 European Wireless (EW 2005), pages 437–443, Nicosia, Cyprus, April 10–13 2005.

    Google Scholar 

  27. F.J. Ros and P.M. Ruiz. Cluster-based OLSR extensions to reduce control overhead in mobile ad hoc networks. In Proceedings of the 2007 international conference on Wireless communications and mobile computing, pages 202–207. ACM, 2007.

    Google Scholar 

  28. A. Srinivas and E. Modiano. Minimum energy disjoint path routing in wireless ad-hoc networks. In Proceedings of the 9th annual international conference on Mobile computing and networking (MobiCom 03), pages 122–133, New York, NY, USA, 2003. ACM.

    Google Scholar 

  29. J.P. Vilela and J. Barros. A feedback reputation mechanism to secure the optimized link state routing protocol. In IEEE Communications International Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm 2007). Los Alamitos (2007), pages 294–303, 2007.

    Google Scholar 

  30. L. Villasenor-Gonzalez, Y. Ge, and L. Lamont. HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks. IEEE Communications Magazine, vol. 43(7), pages 118–125, July 2005.

    Google Scholar 

  31. M. Voorhaen, E. Van de Velde, and C. Blondia. MORHE: A transparent multi-level routing scheme for ad hoc networks. In Challenges in Ad Hoc Networking, K. Al Agha, I. Guérin Lassous, and G. Pujolle, editors, In IFIP International Federation for Information Processing, vol. 197, pages 139–148. Springer Boston, 2006.

    Google Scholar 

  32. B. Wu, J. Chen, J. Wu, and M. Cardei. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Signals and Communication Technology, Y. Xiao and X. S. Shen and D. Du, editors, pages 103–135. Springer US, 2007.

    Google Scholar 

  33. J. Yi, E. Cizeron, S. Hamma, and B. Parrein. Simulation and performance analysis of MP-OLSR for mobile ad hoc networks. In IEEE Wireless Communications and Networking Conference, IEEE WCNC, Las Vegas, March 31-April 3 2008.

    Google Scholar 

  34. J. Yi, E. Cizeron, S. Hamma, B. Parrein, and P. Lesage. Implementation of multipath and multiple description coding in OLSR. CoRR, abs/0902.4781, 2009.

    Google Scholar 

  35. J. Yi, S. David, H. Adnane, B. Parrein, and X. Lecourtier. Multipath OLSR: Simulation and Testbed. In 5th OLSR Interop/Workshop, Vienna Autriche, 10 2009.

    Google Scholar 

  36. J. Yi, A. Adnane, S. David, and B. Parrein. Multipath optimized link state routing for mobile ad hoc networks. In Ad Hoc Networks, vol. 9(1), pages 28–47, 2011.

    Google Scholar 

  37. X. Zhou, Y. Lu, and B. Xi. A novel routing protocol for ad hoc sensor networks using multiple disjoint paths. In Broadband Networks, 2005. BroadNets 2005. 2nd International Conference on, vol. 2, pages 944–948, Boston, MA, October 2005.

    Google Scholar 

Download references

Acknowledgements

The authors graciously acknowledge the financial support received from the following organizations: Natural Sciences and Engineering Research Council of Canada (NSERC), Mathematics of Information Technology and Complex Systems (MITACS), Institut Telecom, Spanish Ministry of Science and Innovation (grants TSI2007-65406-C03-03 E-AEGIS and CONSOLIDER-INGENIO CSD2007-00004 ARES), National Council of Science and Technology (CONACYT), and Ministry of Education of Mexico (SEP, Program for Academic Improvement).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gimer Cervera .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Cervera, G., Barbeau, M., Garcia-Alfaro, J., Kranakis, E. (2012). Security Issues in Link State Routing Protocols for MANETs. In: Kranakis, E. (eds) Advances in Network Analysis and its Applications. Mathematics in Industry, vol 18. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30904-5_6

Download citation

Publish with us

Policies and ethics