首页 | 本学科首页   官方微博 | 高级检索  
     


Trust-based security for the OLSR routing protocol
Authors:Asma Adnane  Christophe Bidan  Rafael Timóteo de Sousa Júnior
Affiliation:1. School of Computing and Mathematics, University of Derby, United Kingdom;2. SUPELEC, SSIR Team, Avenue de la Boulaie, Cesson-Sévigné 35510, France;3. Electrical Engineering Department, University of Braslia, Braslia, DF 70910-900, Brazil;1. School of Information and Communications, Gwangju Institute of Science and Technology, Gwangju, South Korea;2. Intervention Center, Oslo University Hospital, Oslo, Norway;1. Department of Computer Science and Engineering, Kalasalingam University, Krishnankoil 626 126, Tamilnadu, India;2. Department of Electrical and Electronic Engineering, Kalasalingam University, Krishnankoil 626 126, Tamilnadu, India;1. Lebanese American University, Department of Computer Science and Mathematics, Beirut, Lebanon;2. Khalifa University of Science, Technology & Research, Department of ECE, Abu Dhabi, United Arab Emirates
Abstract:The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities.In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR.
Keywords:Trust  Ad hoc networks  Security  Routing protocol  OLSR
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号