Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3837))

Included in the following conference series:

  • 352 Accesses

Abstract

Ad hoc networks offer novel capabilities in the mobile domain widening the mobile application field and arousing significant interest within mobile operators and industrials. Securing routing protocols for ad hoc networks appeared soon as a challenging scope for industrials and researchers’ community, since routing protocols, base of ad hoc networks, haven’t defined any prevention measure or security mechanism in their specifications. In this paper, we propose a securing solution providing the integrity of the OLSR routing messages while respecting ad hoc routing protocols characteristics and operation. The solution relies on a distributed securing scheme based on threshold cryptography features and which completely fits to the OLSR operation. Implementation proves finally the successful operation of the security model and show that additional delay is suitable to OLSR routing specifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Networks Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  2. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: The 9t h International Conference on Network Protocols (ICNP 2001), Riverside, California, USA, November 11-14 (2001)

    Google Scholar 

  3. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: IEEE Symposium on Computers and Communications (ISCC), Taormina, Italy, July 1-4 (2002)

    Google Scholar 

  4. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, Texas, USA, January 27-31 (2002)

    Google Scholar 

  5. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks”. In: The10th IEEE International Conference on Network Protocols (ICNP), Paris, France, November 12-15 (2002)

    Google Scholar 

  6. Fourati., A., Badis, H., Al Agha, K.: Security Vulnerabilities Analysis of the OLSR Routing Protocol. In: The 12th International Conference on Telecommunications, ICT 2005, Cape Town, South Africa, May 3-6 (2005)

    Google Scholar 

  7. Macker, J., Corson, S.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. IETF RFC 2501, IETF Network Working Group (January 1999)

    Google Scholar 

  8. Buttayan, L., Hubaux, J.P.: Report on Working Session on Security in Wireleww Ad Hoc Networks. ACM SIGMOBILE Mobile Computing and Communications Reviews 6(4) (2002)

    Google Scholar 

  9. Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. 2003 Symposium on Applications and the Internet Workshops, SAINT-w 2003 (2003)

    Google Scholar 

  10. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: The 7th International Symposium on Computers and Communications (ISCC 2002), Taormina, Italy, July 1-4 (2002)

    Google Scholar 

  11. Makhuntot, R., Phonphoem, A.: Security Enhancement of the Private Key Distribution method in Wireless Ad Hoc Networks. In: The 7th National Computer Science and Engineering Conference (NCSEC 2003), pp. 282–286. Burapha University (2003)

    Google Scholar 

  12. Mukherjee, A., Deng, H., Agrawal, D.P.: Distributed Pairwise Key Generation Using Shared Polynomials For Wireless Ad Hoc Networks. In: IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004), Paris, France, pp. 215–226 (2004)

    Google Scholar 

  13. Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  14. Clausen, T., Jacquet, P., Laouati, A., Minet, P., Muhltahler, P., Qayyum, A., Viennot, L.: Optimized Link State Routing Protocol. IETF RFC 3626 (2003)

    Google Scholar 

  15. Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. IETF RFC 3561 (2003)

    Google Scholar 

  16. Johnson, D.B., Maltz, D.A., Hu, Y.C.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). IETF Draft 10 (2004)

    Google Scholar 

  17. http://www.olsr.org (last visit on October 9, 2005)

  18. Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: The ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), Fairfax VA (October 2003)

    Google Scholar 

  19. Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: Mitigating Byzantine Attacks in Ad Hoc Wireless Networks. Technical Report Version 1 (March 2004)

    Google Scholar 

  20. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: International Conference on Mobile Computing and Networking, Mobicom, Boston, USA (2000)

    Google Scholar 

  21. Fourati, A., Al Agha, K.: A completely distributed and auto-organized algorithm securing the OLSR routing protocol. In: IFIP Open Conference on Metropolitan Area Networks, IFIP MAN 2005, HCMC, Viet Nam, April 11-13 (2005)

    Google Scholar 

  22. http://qolsr.lri.fr (last visit on, October 9, 2005)

  23. Free C++ class library of cryptographic schemes, http://www.eskimo.com/~weidai/cryptlib.html (last visit on October 9, 2005)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fourati, A., Agha, K.A., Claveirole, T. (2005). Securing OLSR Routes. In: Cho, K., Jacquet, P. (eds) Technologies for Advanced Heterogeneous Networks. AINTEC 2005. Lecture Notes in Computer Science, vol 3837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599593_14

Download citation

  • DOI: https://doi.org/10.1007/11599593_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30884-3

  • Online ISBN: 978-3-540-32292-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics