2010
DOI: 10.5121/ijnsa.2010.2213
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in the Optimized Link State Routing Protocol Version 2 (Olsrv2)

Abstract: Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of "trusted participants", the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…We present a series of simulations that show the validity of our approach, and that reveal that our method considerably improves the performance of previous existing proposals. Our proposal is, moreover, compatible with the forthcoming evolutions of the OLSR protocol (referred as OLSRv2 in the literature), by addressing the sketched extended quality criteria, such as the security aspects of the resulting new protocol [9,10].…”
Section: Introductionmentioning
confidence: 72%
“…We present a series of simulations that show the validity of our approach, and that reveal that our method considerably improves the performance of previous existing proposals. Our proposal is, moreover, compatible with the forthcoming evolutions of the OLSR protocol (referred as OLSRv2 in the literature), by addressing the sketched extended quality criteria, such as the security aspects of the resulting new protocol [9,10].…”
Section: Introductionmentioning
confidence: 72%
“…routers not able to correctly sign messages), but malicious routers can still record and replay messages (see [8] for details on such "replay attacks"). These replay attacks can be partly avoided by introducing "freshness" information, such as timestamps or nonces, in messages.…”
Section: Timestampsmentioning
confidence: 99%
“…that the MPR flooding process operates correctly. [8] provides a detailed security analysis of OLSRv2, observing how, and with which consequences, a disruptive attack might be conducted against an OLSRv2 network. A common, and not surprising, observation from [8] is, that identity spoofing and link spoofing, i.e., that a router in its control traffic either pretends to have the identity of another router or pretends to have (non-existing) links to another router, are major vectors for disruptive attacks on an OLSRv2 network.…”
Section: B Olsrv2 Vulnerability Taxonomymentioning
confidence: 99%
“…In a neighbor discovery based mechanism, a malicious router can intentionally and frequently alter the information declared -including the RSSV -so as to cause generation of inordinate amounts of control traffic by legitimate routers. Such indirect jamming is discussed in [15] for neighborhood discovery and link state advertisement, and also applies for the RSSV, which a malicious router may alter and signal frequently, causing its neighborhood to launch (possibly computationally intensive) RSS recalculations and signal selected relay set (causing increased channel occupation) as well as the change of its neighbor's status.…”
Section: B Rssv Indirect Jammingmentioning
confidence: 99%