Analysis of the node isolation attack against OLSR-based mobile ad hoc networks

Bounpadith Kannhavong, Hidehisa Nakayama, N. Kato, Y. Nemoto, A. Jamalipour
{"title":"Analysis of the node isolation attack against OLSR-based mobile ad hoc networks","authors":"Bounpadith Kannhavong, Hidehisa Nakayama, N. Kato, Y. Nemoto, A. Jamalipour","doi":"10.1109/ISCN.2006.1662504","DOIUrl":null,"url":null,"abstract":"Recent advances in wireless networking technologies have made it possible to construct a mobile ad hoc network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, they are much more vulnerable to malicious attacks than a conventional wired network. In MANET, routing plays an important role in providing connectivity for mobile nodes who are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. However, in hostile environment mobile nodes are susceptible to various types of routing attacks. This paper identifies a new routing attack, called node isolation attack, against optimized link state routing (OLSR) protocol, one of the four standard routing protocols for MANETs. We analyze in detail and demonstrate the impact of this attack in order to show the necessity for a countermeasure to guard against the attack. As a first step to defend against the attack, we present a simple technique to detect the attack and identify the source of the attack","PeriodicalId":304528,"journal":{"name":"2006 International Symposium on Computer Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"67","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Symposium on Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCN.2006.1662504","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 67

Abstract

Recent advances in wireless networking technologies have made it possible to construct a mobile ad hoc network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, they are much more vulnerable to malicious attacks than a conventional wired network. In MANET, routing plays an important role in providing connectivity for mobile nodes who are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. However, in hostile environment mobile nodes are susceptible to various types of routing attacks. This paper identifies a new routing attack, called node isolation attack, against optimized link state routing (OLSR) protocol, one of the four standard routing protocols for MANETs. We analyze in detail and demonstrate the impact of this attack in order to show the necessity for a countermeasure to guard against the attack. As a first step to defend against the attack, we present a simple technique to detect the attack and identify the source of the attack
基于olsr的移动自组网节点隔离攻击分析
无线网络技术的最新进展使构建可应用于无基础设施情况的移动自组网(MANET)成为可能。然而,由于其固有的特性,它们比传统的有线网络更容易受到恶意攻击。在MANET中,路由在为不在同一无线电范围内的移动节点提供连接方面起着重要作用。MANET中现有的路由协议假定了一个可信和可靠的环境。然而,在恶劣环境下,移动节点容易受到各种路由攻击。本文提出了一种新的路由攻击,称为节点隔离攻击,针对优化链路状态路由(OLSR)协议,四种标准路由协议之一的manet。我们对此次攻击的影响进行了详细的分析和论证,以说明防范攻击的对策的必要性。作为防御攻击的第一步,我们提出了一种简单的技术来检测攻击并识别攻击源
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信