Abstract
In this paper, we have focused on the implementation of a mechanism for detecting malicious nodes in the MP-OLSR routing protocol through the integration of trust reasoning. The study carried out has enabled the emergence of trust rules between nodes based on local information and messages exchanged during the neighborhood discovery process and network topology to make the MP-OLSR protocol more trusted. The correlation between the received control messages allows nodes to validate the neighborhood at one hop and two hops. When the information received is consistent with the MP-OLSR protocol specifications, this reasoning allows the creation of a trust relationship. Otherwise, it allows nodes to be wary of the sources of its inconsistencies. When an attack is detected, the countermeasure proposed allows the attacking node to be isolated from the network and to guarantee its non-participation in the routing mechanism by simply integrating this node in the HELLO message with a modified Link Code, so that it is declared by all the nodes of the network as an attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Russia, S., Anita, R.: Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel. Netw. 23, 2307–2316 (2017)
Kok, G., Chow, C., Xu, Y., et al.: EAOMDV-MIMC: a multipath routing protocol for multi-interface multi-channel mobile ad-hoc networks. Wirel. Pers Commun. 73, 477–504 (2013). https://doi.org/10.1007/s11277-013-1198-5
Kim, S.: An ant-based multipath routing algorithm for Qos aware mobile ad-hoc networks. Wirel. Pers. Commun. 66, 739–749 (2012)
Zhang, Y., Yan, T., Tian, J., Hua, Q., Wangb, G., Li, Z.: TOHIP: a topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Netw. 21, 109–122. ISSN: 1570-8705
Zhang, Y., Wang, G., Hu, Q., Li, Z., Tian, J.: Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM (2012)
Hothefa, S., Raed, A.: Multipath routing algorithm using an electromagnetic-like mechanism with threshold acceptance for mobile Ad hoc networks. Wirel. Person. Commun. 81(2), 607–630 (2015)
Marchang, N., Datta, R.: Light-weight trust-based routing protocol for mobile ad hoc networks, IET Inf. Secur. 6(2), 77–83 (2012)
Mawloud, O., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35, 268–286 (2012)
Huang, J., Woungang, I., Chao, H., Obaidat, M.: Multi-path trust-based secure AOMDV routing in Ad Hoc Networks. In: Global Telecommunications Conference (GLOBECOM) (2012)
Yi, J., Cizeron, E., Hamma, S., Parrein, B.: Simulation and performance analysis of MP-OLSR for mobile ad hoc networks. In: IEEE WCNC: Wireless Communications and Networking Conference, Las Vegas, USA (2008)
Tarique, M., Tepe, K., Adibi, S., Erfani, S.: Survey of multipath routing protocols for mobile ad hoc networks. J. Netw. Comput. Appl. 32(6), 1125–1143 (2009)
Pham, P.: Multi-path routing with load balance and cross-layer design in MANETs. PhD thesis, University of South Australia, Australia, August 2004
Yi, J., Adnane, A., David, S., Parrein, B.: Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Netw. 9(1), 28–47 (2011)
Kun, M., Jingdong, Y., Zhi, R.: The research and simulation of multipath-OLSR for mobile ad hoc network. In: IEEE International Symposium on Communications and Information Technology (ISCIT), pp. 540–543, October 2005
Badis, H., Al Agha, K.: QOLSR multi-path routing for mobile ad hoc networks based on multiple metrics: bandwidth and delay. In: Vehicular Technology Conference, vol. 4, pp. 2181–2184. IEEE, May 2004
Aiache, H., Haettel, F., Lebrun, L., Tavernier, C.: Improving security and performance of an ad hoc network through a multipath routing strategy. J. Comput. Virol. 4, 267–278 (2008)
Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems a distributed authentication perspective. In: Proceeding of the IEEE Symposium on Security and Privacy (1993)
Grandison, T., Sloman, M.: A survey of trust in internet applications. In: IEEE Communications Surveys and Tutorials (2000)
Viljanen, L.: Towards an ontology of trust. In: Trust, Privacy and Security in Digital Business. Springer (2005)
Aberer, K., Despotovic, Z.: Managing trust in P2P information system. In: Proceeding of the Tenth International Conference on Information and Knowledge Management (CIKM01). ACM Press (2001)
Marsh, S.: Formalising Trust as a Computational Concept. PHD thesis, University of Stirling, 148 (1994)
Adnane, A., Timoteo, R., Bidan, C., Mé, L.: Analysis of the implicit trust within the OLSR protocol. In: IFITM 07: Joint iTrust and PST Conference on Privacy, Trust Management and Security, volume 238 of IFIP International Federation for Information Processing. Springer, July 2007. ISBN: 978-0-387-73654-9
Timoteo, R., Adnane, A., Bidan, C., Mé, L.: Analyse de la confiance implicite requise dans le outage adhoc OLSR. In: SARSSI 2007: The 2nd Joint Conference on Security in Network Architectures and Information Systems, June 2007. ISBN: 2-916377-49-2
Wang, M., Lamont, L., Mason, P., Gorlatova, M.: An effective intrusion detection approach for OLSR MANET protocol. In: 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec 2005), pp. 55–60 (2005)
Adjih, C., Clausen, T., Jaquet, P., Muhlethaler, P., Laouiti, A., Raffo, D.: Securing the OLSR protocol. In: Med Hoc-Net, pp. 25–27, June 2003
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zougagh, H., Idboufker, N., Saadi, Y. (2021). Trust-Based Intrusion Detection for Multi Path OLSR Protocol. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_66
Download citation
DOI: https://doi.org/10.1007/978-3-030-73689-7_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73688-0
Online ISBN: 978-3-030-73689-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)