Reliable Mutual Node Evaluation for Trust-Based OLSR in Tactical MANETs

  • Ji-Hun Lim
  • Keun-Woo Lim
  • Young-Bae Ko
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 234)


This paper proposes a mutual node evaluation method in mobile ad hoc networks to recognize and reliably remove attacker nodes from deteriorating the network. We focus on a tactical networking environment, where the network is generally maintained in harsh and hostile areas while the applications require stringent service requirements. In these kinds of environments, it is desirable to utilize proactive routing methods such as Optimized Link State Routing (OLSR). However, OLSR have weaknesses against various security attacks. To solve this problem, we provide a trust-based evaluation approach where node evaluate each other based on the packet forwarding capabilities. We prove the performance of our proposed method through NS-3.


Trust-based routing Mobile ad hoc networks Tactical networks Optimized Link State Routing 



This research was supported in part by the MIST (Ministry of Science and ICT), Korea, under the National Program for Excellence in SW supervised by the IITP (Institute for Information & communications Technology Promotion) (20150009080031001), and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2015R1D1A1A01059049).


  1. 1.
    Clausen, T., Jacquet, P., Laoiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized Link State Routing Protocol. IETF Internet Request For Comments RFC 3626 (2003)Google Scholar
  2. 2.
    Ronggong, S., Mason Peter, C.: ROLSR: a robust optimized link state routing protocol for military ad-hoc networks. In: IEEE MILCOM 2010 (2010)Google Scholar
  3. 3.
    Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: SA-OLSR: security aware optimized link state routing for mobile ad hoc networks. In: IEEE ICC 2008 (2008)Google Scholar
  4. 4.
    Hu, Y.-C., Perrig, A., Johnson, D.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRefGoogle Scholar
  5. 5.
    Gerhards-Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., Tolle, J.: Detecting black hole attacks in tactical MANETs using topology graphs. In: IEEE LCN 2007 (2007)Google Scholar
  6. 6.
    Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mobile Comput. 1, 163–172 (2016)CrossRefGoogle Scholar
  7. 7.
    Li, Z., Wu, Y.: Smooth mobility and link reliability based optimized link state routing scheme for MANETs. IEEE Commun. Lett. 21(7), 1529–1532 (2017)CrossRefGoogle Scholar
  8. 8.
    Postel, J.: Transmission Control Protocol. Internet Request For Comments RFC 793 (1981)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.Ajou UniversitySuwonSouth Korea
  2. 2.Telecom Paristech, INFRES, RMSParisFrance

Personalised recommendations