Abstract
Ad hoc networks offer novel capabilities in the mobile domain widening the mobile application field and arousing significant interest within mobile operators and industrials. Securing routing protocols for ad hoc networks appeared soon as a challenging scope for industrials and researchers’ community, since routing protocols, base of ad hoc networks, haven’t defined any prevention measure or security mechanism in their specifications. In this paper, we propose a securing solution providing the integrity of the OLSR routing messages while respecting ad hoc routing protocols characteristics and operation. The solution relies on a distributed securing scheme based on threshold cryptography features and which completely fits to the OLSR operation. Implementation proves finally the successful operation of the security model and show that additional delay is suitable to OLSR routing specifications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks Magazine 13(6), 24–30 (1999)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: The 9t h International Conference on Network Protocols (ICNP 2001), Riverside, California, USA, November 11-14 (2001)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: IEEE Symposium on Computers and Communications (ISCC), Taormina, Italy, July 1-4 (2002)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, Texas, USA, January 27-31 (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks”. In: The10th IEEE International Conference on Network Protocols (ICNP), Paris, France, November 12-15 (2002)
Fourati., A., Badis, H., Al Agha, K.: Security Vulnerabilities Analysis of the OLSR Routing Protocol. In: The 12th International Conference on Telecommunications, ICT 2005, Cape Town, South Africa, May 3-6 (2005)
Macker, J., Corson, S.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. IETF RFC 2501, IETF Network Working Group (January 1999)
Buttayan, L., Hubaux, J.P.: Report on Working Session on Security in Wireleww Ad Hoc Networks. ACM SIGMOBILE Mobile Computing and Communications Reviews 6(4) (2002)
Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. 2003 Symposium on Applications and the Internet Workshops, SAINT-w 2003 (2003)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: The 7th International Symposium on Computers and Communications (ISCC 2002), Taormina, Italy, July 1-4 (2002)
Makhuntot, R., Phonphoem, A.: Security Enhancement of the Private Key Distribution method in Wireless Ad Hoc Networks. In: The 7th National Computer Science and Engineering Conference (NCSEC 2003), pp. 282–286. Burapha University (2003)
Mukherjee, A., Deng, H., Agrawal, D.P.: Distributed Pairwise Key Generation Using Shared Polynomials For Wireless Ad Hoc Networks. In: IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), Paris, France, pp. 215–226 (2004)
Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)
Clausen, T., Jacquet, P., Laouati, A., Minet, P., Muhltahler, P., Qayyum, A., Viennot, L.: Optimized Link State Routing Protocol. IETF RFC 3626 (2003)
Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. IETF RFC 3561 (2003)
Johnson, D.B., Maltz, D.A., Hu, Y.C.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). IETF Draft 10 (2004)
http://www.olsr.org (last visit on October 9, 2005)
Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: The ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax VA (October 2003)
Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: Mitigating Byzantine Attacks in Ad Hoc Wireless Networks. Technical Report Version 1 (March 2004)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: International Conference on Mobile Computing and Networking, Mobicom, Boston, USA (2000)
Fourati, A., Al Agha, K.: A completely distributed and auto-organized algorithm securing the OLSR routing protocol. In: IFIP Open Conference on Metropolitan Area Networks, IFIP MAN 2005, HCMC, Viet Nam, April 11-13 (2005)
http://qolsr.lri.fr (last visit on, October 9, 2005)
Free C++ class library of cryptographic schemes, http://www.eskimo.com/~weidai/cryptlib.html (last visit on October 9, 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fourati, A., Agha, K.A., Claveirole, T. (2005). Securing OLSR Routes. In: Cho, K., Jacquet, P. (eds) Technologies for Advanced Heterogeneous Networks. AINTEC 2005. Lecture Notes in Computer Science, vol 3837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599593_14
Download citation
DOI: https://doi.org/10.1007/11599593_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30884-3
Online ISBN: 978-3-540-32292-4
eBook Packages: Computer ScienceComputer Science (R0)