2010 IFIP Wireless Days 2010
DOI: 10.1109/wd.2010.5657700
|View full text |Cite
|
Sign up to set email alerts
|

Collusion attack resistance through forced MPR switching in OLSR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…In the suggested technique [9], when the node detects a symptom of collusion attack, it adds the lone MPR to an AvoidanceSet after waiting for AvoidanceDelay. All entries in the AvoidanceSet of X are not included in its MPRs computation process.…”
Section: B Multi-point Relays Selectionmentioning
confidence: 99%
“…In the suggested technique [9], when the node detects a symptom of collusion attack, it adds the lone MPR to an AvoidanceSet after waiting for AvoidanceDelay. All entries in the AvoidanceSet of X are not included in its MPRs computation process.…”
Section: B Multi-point Relays Selectionmentioning
confidence: 99%
“…The main drawback of this solution is that false alarms may be triggered when links between nodes break if the nodes are highly mobile. In [10], the authors use the FMS-OLSR (Forced MPR Switching OLSR) algorithm to detect this type of attack. When node "X" generates a HELLO message, it checks the number of nodes in its MPR set.…”
Section: Related Workmentioning
confidence: 99%
“…Node isolation attack and a method of its prevention has been introduced in [8]. Malicious nodes collusion attack and a countermeasure against that has been studied in [9] and [10]. In [11], [12], and [13] a definition of different attacks against MANETs and a description of their operation has been explained.…”
Section: Related Workmentioning
confidence: 99%
“…In collusion attack, some of the malicious nodes collude with each other and manipulate routing information of one or a number of other nodes such that those nodes will not be accessible in the network anymore [9], [10].…”
Section: Collusion Attackmentioning
confidence: 99%