An effective intrusion detection approach for OLSR MANET protocol

被引:0
|
作者
Wang, M
Lamont, L
Mason, P
Gorlatova, M
机构
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Optimized Link State Routing (OLSR) protocol is a proactive Mobile Ad hoc Network (MAND) routing protocol. Security aspects have not been designed into the OLSR protocol and therefore make it vulnerable to various kinds of attacks. Recent research efforts have focused on providing authentication and encryption techniques to secure the OLSR protocol against attacks from outside intruders. A second line of defense is required to provide intrusion detection and response techniques in protecting the OLSR protocol against attacks from inside intruders. In this paper, we describe security threats to the OLSR MANET routing protocol and present an intrusion detection solution based on protocol semantics checking. Our approach is based on semantic properties that are implied in the protocol definition and specify the correct OLSR routing update behavior. Conflict checking based on semantic properties is applied in every MANET node. Any abnormal protocol semantics will trigger an intrusion alarm. While we use OLSR as an example, we argue that the presented approach can be applied to any Multi-Point Relay (MPR) proactive MANET protocol.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 50 条
  • [31] Optimizing Performance of OLSR Protocol Using Energy Based MPR Selection in MANET
    Prajapati, Sefali
    Patel, Nimisha
    Patel, Rajan
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 268 - 272
  • [32] Evaluation of SIP Signalling and QoS for VoIP Over OLSR MANET Routing Protocol
    Alshamrani, Mazin
    Cruickshank, Haitham
    Sun, Zhili
    Elmasri, Basil
    Fami, Vahid
    UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 699 - 706
  • [33] An Approach for Determining Conditions for Monitoring of Critical Nodes for MANET Intrusion Detection System
    Mhala, Nitiket N.
    Choudhari, N. K.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2011, 4 (01): : 55 - 59
  • [34] Study on Effective Protocol Design for MANET
    Li, Lixin
    Zhang, Huisheng
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 282 - 285
  • [35] Fuzzy based intrusion detection system in MANET
    Edwin Singh C.
    Celestin Vigila S.M.
    Measurement: Sensors, 2023, 26
  • [36] Fuzzy Based Intrusion Detection Systems in MANET
    Balan, Vishnu E.
    Priyan, M. K.
    Gokulnath, C.
    Devi, Usha G.
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 109 - 114
  • [37] A Context Adaptive Intrusion Detection System for MANET
    Cheng, Bo-Chao
    Tseng, Ryh-Yuh
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 310 - 318
  • [38] CMIDS: Collaborative MANET Intrusion Detection System
    Carvalho, Jeronymo M. A.
    Costa, Paulo C. G.
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 29 - 33
  • [39] A Weighted Approach for MPR Selection in OLSR Protocol
    Chandana, Ritu
    Jain, Sweta
    Kumar, Abhijit
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 38 - 43
  • [40] Log-based Intrusion Detection for MANET
    Alattar, Mouhannad
    Sailhan, Francoise
    Bourgeois, Julien
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 697 - 702