Gimer Cervera, M. Barbeau, Joaquín García, E. Kranakis
{"title":"分层OLSR网络中洪水中断攻击的缓解","authors":"Gimer Cervera, M. Barbeau, Joaquín García, E. Kranakis","doi":"10.1109/CNSR.2011.32","DOIUrl":null,"url":null,"abstract":"The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for inter-cluster communications. Nevertheless, HOLSR was designed without security measures. Therefore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process. We present a taxonomy of flooding disruption attacks, that affect the topology map acquisition process in HOLSR networks, and preventive mechanisms to mitigate the effect of this kind of attacks.","PeriodicalId":272359,"journal":{"name":"2011 Ninth Annual Communication Networks and Services Research Conference","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks\",\"authors\":\"Gimer Cervera, M. Barbeau, Joaquín García, E. Kranakis\",\"doi\":\"10.1109/CNSR.2011.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for inter-cluster communications. Nevertheless, HOLSR was designed without security measures. Therefore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process. We present a taxonomy of flooding disruption attacks, that affect the topology map acquisition process in HOLSR networks, and preventive mechanisms to mitigate the effect of this kind of attacks.\",\"PeriodicalId\":272359,\"journal\":{\"name\":\"2011 Ninth Annual Communication Networks and Services Research Conference\",\"volume\":\"107 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Ninth Annual Communication Networks and Services Research Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CNSR.2011.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Ninth Annual Communication Networks and Services Research Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2011.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for inter-cluster communications. Nevertheless, HOLSR was designed without security measures. Therefore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process. We present a taxonomy of flooding disruption attacks, that affect the topology map acquisition process in HOLSR networks, and preventive mechanisms to mitigate the effect of this kind of attacks.