2006 International Symposium on Computer Networks
DOI: 10.1109/iscn.2006.1662504
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Node Isolation Attack Against OLSR-based Mobile Ad Hoc Networks

Abstract: Recent advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, they are much more vulnerable to malicious attacks than a conventinal wired network. In MANET, routing plays an important role in providing connectivity for mobile nodes who are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. How… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(37 citation statements)
references
References 22 publications
0
37
0
Order By: Relevance
“…Fourati and Al Agha (2006) proposed a shared secret based method has been proposed to meet the security requirements such as node authentication, maintaining the integrity of control packets, and guarding the routing process against selfish nodes. Kannhavong et al (2006) examined node isolation attacks in MANETs running OLSR protocol. They proposed that node isolation can be prevented by overhearing MPR node by setting a time limit for receiving HELLO and TC message from neighbouring nodes.…”
Section: Cryptography Methods For Securing Olsr Protocolmentioning
confidence: 99%
“…Fourati and Al Agha (2006) proposed a shared secret based method has been proposed to meet the security requirements such as node authentication, maintaining the integrity of control packets, and guarding the routing process against selfish nodes. Kannhavong et al (2006) examined node isolation attacks in MANETs running OLSR protocol. They proposed that node isolation can be prevented by overhearing MPR node by setting a time limit for receiving HELLO and TC message from neighbouring nodes.…”
Section: Cryptography Methods For Securing Olsr Protocolmentioning
confidence: 99%
“…AODV is a reactive nature of routing in which route discovery starts whenever demanded [11] and Sequence number is increased by node if new node is established to the node. Higher sequence number means to the fresh routes [12] in WSN and for avoiding routing loop problem in AODV.…”
Section: Adhoc On Demand Vector (Aodv) Routingmentioning
confidence: 99%
“…In [14], [15] the uses of timestamps are proposed in order to counter against replay attacks. The authors of [16] also proposed the use of signature to ensure authentication in order to prevent identity spoofing attacks. In Ariadne [17] every intermediate node appends a HMAC based on a TESLA a key that will not be disclosed at least until the destination receives the RREQ.…”
Section: Related Workmentioning
confidence: 99%