Analysis of the implicit trust within the OLSR protocol

  • Asmaa Adnane
  • Rafael Timóteo de SousaJr
  • Christophe Bidan
  • Ludovic Mé
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 238)


Trust is an interesting criterion for analyzing and comparing network protocols. The goal of this paper is to explicit the different types of trust relations between entities which exchange routing information and establish a routing infra-structure based on the OLSR protocol. One such entity assumes the other entities will behave in a particular way and the relations coming from this trust behavior are expressed in this paper using a formal language. This approach highlights the process of trust construction in OLSR and allows the analysis of trust requirements for this protocol, as well as the expression of attacks related to the betrayal of trust relations. Besides, this analysis allows the description of indicators for OLSR entities to have a protective mistrust behavior when effectively acting based on trust relations


Trust Relationship Trust Management Topological Information Selfish Node Optimize Link State Route 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Mui L (2003) Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, PhD Thesis, Massachusetts Institute of Technology.Google Scholar
  2. 2.
    Clausen T, Laouiti A, Muhlethaler P, Raffo D, Adjih C (2005) Securing the OLSR routing protocol with or without compromised nodes in the network, HAL — CCSd — CNRS, INRIA — Rocquencourt.Google Scholar
  3. 3.
    Clausen T, Jacquet P (2003) IETF RFC-3626: Optimized Link State Routing Protocol OLSR.Google Scholar
  4. 4.
    Yahalom R, Klein B, Beth T (1993) Trust Relationships in Secure Systems — A Distributed Authentication Perspective. In: SP’93: Proceedings of the 1993 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, USA.Google Scholar
  5. 5.
    Marsh S (1994) Formalising Trust as a Computational Concept, PhD Thesis. Department of Mathematics and Computer Science, University of Stirling.Google Scholar
  6. 6.
    Raffo D (2005) Security Schemes for the OLSR Protocol for Ad Hoc Networks, PhD Thesis, University of Paris 6 Pierre et Marie Curie. Google Scholar
  7. 7.
    Buchegger S (2004) Coping with Misbehavior in Mobile Ad-hoc Networks, PhD Thesis. IC School of Computer and Communication Sciences, Lausanne university.Google Scholar
  8. 8.
    Fourati A, Al Agha K (2006) A Shared Secret-based Algorithm for Securing the OLSR Routing Protocol. Springer Netherlands, Telecommunication Systems, Volume 31, Numbers 2–3, pp. 213–226.CrossRefGoogle Scholar
  9. 9.
    Jensen C D, Connell P O (2006) Trust-Based Route Selection in Dynamic Source Routing. In: Trust Management, 4th International Conference, iTrust 2006. Springer, Volume 3986/2006, pp. 150–163, Pisa, Italy.CrossRefGoogle Scholar
  10. 10.
    Michiardi P (2004) Cooperation Enforcement and Network Security Mechanisms for Mobile Ad Hoc Networks, PhD Thesis, Ecole nationale supérieure des télécommunications, Paris.Google Scholar
  11. 11.
    Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 463–469.Google Scholar
  12. 12.
    Liu J, Issarny V (2004) Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Trust Management. 2nd International Conference, iTrust 2004. Springer, Volume 2995/2004, pp. 48–62, Oxford, UK.Google Scholar
  13. 13.
    Grandison T, Sloman M (2000) A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials, 4th Quarter, Vol. 3, No. 4.Google Scholar
  14. 14.
    Viljanen L (2005) Towards an Ontology of Trust. In: Trust, Privacy and Security in Digital Business. Springer, Volume 3592/2005, pp. 175–184.Google Scholar
  15. 15.
    Puttini R S, Mé L, Sousa Jr R T (2004) On the Vulnerabilities and Protection of Mobile Ad Hoc Network Routing Protocols. In: Proceedings of the 3rd International Conference on Networking ICN’2004. IEEE, pp. 676–684, New Jersey, USA.Google Scholar
  16. 16.
    Nanz S, Hankin C (2006) A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science, Volume 367, pp. 203–227.MATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    Bussard L (2004) Trust Establishment Protocols for Communicating Devices, PhD Thesis, Eurecom — ENST.Google Scholar
  18. 18.
    Johnson D B (1973) A Note on Dijkstra’s Shortest Path Algorithm, Journal of the ACM, Volume 20, pp. 385–388, New York, USA.CrossRefGoogle Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Asmaa Adnane
    • 1
  • Rafael Timóteo de SousaJr
    • 2
  • Christophe Bidan
    • 1
  • Ludovic Mé
    • 1
  1. 1.Supélec - Equipe SSIR (EA 4039)France
  2. 2.University of Brasília - LabRedesBrazil

Personalised recommendations