[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1383))

Included in the following conference series:

Abstract

In this paper, we have focused on the implementation of a mechanism for detecting malicious nodes in the MP-OLSR routing protocol through the integration of trust reasoning. The study carried out has enabled the emergence of trust rules between nodes based on local information and messages exchanged during the neighborhood discovery process and network topology to make the MP-OLSR protocol more trusted. The correlation between the received control messages allows nodes to validate the neighborhood at one hop and two hops. When the information received is consistent with the MP-OLSR protocol specifications, this reasoning allows the creation of a trust relationship. Otherwise, it allows nodes to be wary of the sources of its inconsistencies. When an attack is detected, the countermeasure proposed allows the attacking node to be isolated from the network and to guarantee its non-participation in the routing mechanism by simply integrating this node in the HELLO message with a modified Link Code, so that it is declared by all the nodes of the network as an attacker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Russia, S., Anita, R.: Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel. Netw. 23, 2307–2316 (2017)

    Article  Google Scholar 

  2. Kok, G., Chow, C., Xu, Y., et al.: EAOMDV-MIMC: a multipath routing protocol for multi-interface multi-channel mobile ad-hoc networks. Wirel. Pers Commun. 73, 477–504 (2013). https://doi.org/10.1007/s11277-013-1198-5

    Article  Google Scholar 

  3. Kim, S.: An ant-based multipath routing algorithm for Qos aware mobile ad-hoc networks. Wirel. Pers. Commun. 66, 739–749 (2012)

    Article  Google Scholar 

  4. Zhang, Y., Yan, T., Tian, J., Hua, Q., Wangb, G., Li, Z.: TOHIP: a topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Netw. 21, 109–122. ISSN: 1570-8705

    Google Scholar 

  5. Zhang, Y., Wang, G., Hu, Q., Li, Z., Tian, J.: Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM (2012)

    Google Scholar 

  6. Hothefa, S., Raed, A.: Multipath routing algorithm using an electromagnetic-like mechanism with threshold acceptance for mobile Ad hoc networks. Wirel. Person. Commun. 81(2), 607–630 (2015)

    Article  Google Scholar 

  7. Marchang, N., Datta, R.: Light-weight trust-based routing protocol for mobile ad hoc networks, IET Inf. Secur. 6(2), 77–83 (2012)

    Google Scholar 

  8. Mawloud, O., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35, 268–286 (2012)

    Article  Google Scholar 

  9. Huang, J., Woungang, I., Chao, H., Obaidat, M.: Multi-path trust-based secure AOMDV routing in Ad Hoc Networks. In: Global Telecommunications Conference (GLOBECOM) (2012)

    Google Scholar 

  10. Yi, J., Cizeron, E., Hamma, S., Parrein, B.: Simulation and performance analysis of MP-OLSR for mobile ad hoc networks. In: IEEE WCNC: Wireless Communications and Networking Conference, Las Vegas, USA (2008)

    Google Scholar 

  11. Tarique, M., Tepe, K., Adibi, S., Erfani, S.: Survey of multipath routing protocols for mobile ad hoc networks. J. Netw. Comput. Appl. 32(6), 1125–1143 (2009)

    Article  Google Scholar 

  12. Pham, P.: Multi-path routing with load balance and cross-layer design in MANETs. PhD thesis, University of South Australia, Australia, August 2004

    Google Scholar 

  13. Yi, J., Adnane, A., David, S., Parrein, B.: Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Netw. 9(1), 28–47 (2011)

    Article  Google Scholar 

  14. Kun, M., Jingdong, Y., Zhi, R.: The research and simulation of multipath-OLSR for mobile ad hoc network. In: IEEE International Symposium on Communications and Information Technology (ISCIT), pp. 540–543, October 2005

    Google Scholar 

  15. Badis, H., Al Agha, K.: QOLSR multi-path routing for mobile ad hoc networks based on multiple metrics: bandwidth and delay. In: Vehicular Technology Conference, vol. 4, pp. 2181–2184. IEEE, May 2004

    Google Scholar 

  16. Aiache, H., Haettel, F., Lebrun, L., Tavernier, C.: Improving security and performance of an ad hoc network through a multipath routing strategy. J. Comput. Virol. 4, 267–278 (2008)

    Article  Google Scholar 

  17. Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems a distributed authentication perspective. In: Proceeding of the IEEE Symposium on Security and Privacy (1993)

    Google Scholar 

  18. Grandison, T., Sloman, M.: A survey of trust in internet applications. In: IEEE Communications Surveys and Tutorials (2000)

    Google Scholar 

  19. Viljanen, L.: Towards an ontology of trust. In: Trust, Privacy and Security in Digital Business. Springer (2005)

    Google Scholar 

  20. Aberer, K., Despotovic, Z.: Managing trust in P2P information system. In: Proceeding of the Tenth International Conference on Information and Knowledge Management (CIKM01). ACM Press (2001)

    Google Scholar 

  21. Marsh, S.: Formalising Trust as a Computational Concept. PHD thesis, University of Stirling, 148 (1994)

    Google Scholar 

  22. Adnane, A., Timoteo, R., Bidan, C., Mé, L.: Analysis of the implicit trust within the OLSR protocol. In: IFITM 07: Joint iTrust and PST Conference on Privacy, Trust Management and Security, volume 238 of IFIP International Federation for Information Processing. Springer, July 2007. ISBN: 978-0-387-73654-9

    Google Scholar 

  23. Timoteo, R., Adnane, A., Bidan, C., Mé, L.: Analyse de la confiance implicite requise dans le outage adhoc OLSR. In: SARSSI 2007: The 2nd Joint Conference on Security in Network Architectures and Information Systems, June 2007. ISBN: 2-916377-49-2

    Google Scholar 

  24. Wang, M., Lamont, L., Mason, P., Gorlatova, M.: An effective intrusion detection approach for OLSR MANET protocol. In: 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec 2005), pp. 55–60 (2005)

    Google Scholar 

  25. Adjih, C., Clausen, T., Jaquet, P., Muhlethaler, P., Laouiti, A., Raffo, D.: Securing the OLSR protocol. In: Med Hoc-Net, pp. 25–27, June 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zougagh, H., Idboufker, N., Saadi, Y. (2021). Trust-Based Intrusion Detection for Multi Path OLSR Protocol. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_66

Download citation

Publish with us

Policies and ethics