Abstract
In this paper, we investigate the use of Aspect-Oriented Programming (AOP) [13] in the domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability issues in Proactive routing protocols. This paper classifies the different possible attacks and examines the countermeasures to ensure availability. Our approach is based on a detection-reaction process. The reasoning followed by the detection process is built on a formal description of normal and incorrect node behaviors. This model allows us to derive security properties. These properties are woven into our implementation using the AOP. Our algorithm checks if these security properties are violated. If they are, detection of incorrect (malicious) behaviors occurs to allow the normal node to find a path without incorrect node behavior. Therefore the detector node sends to its neighborhood the detection information to allow its neighbors to avoid choosing the intruder as a node to cross to. A node chooses the path using its local diagnosis and the reputation of other nodes. Using a field in the standard control message to communicate the detections, our approach does not change the message format, so it is very easy to use and there is no overhead. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
A collaboratoin between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC. The ns Manual, http://www.isi.edu/nsnam/ns/doc/index.html
Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P., Raffo, D.: Securing the OLSR protocol. In: Med-Hoc-Net 2003. 2nd IFIP Annual Mediterranean Ad Hoc Networking Workshop, Mahdia, Tunisia (June 25–27, 2003)
Bhargava, S., Agrawal, D.P.: Security enhancements in aodv protocol for wireless ad hoc networks. In: VTC 2001 Fall, vol. 4, pp. 214–347 (2001)
Clausen, T., Jacquet, P. (eds.): Optimized Link State Routing protocol (OLSR) (2003) RFC 3626, http://www.olsr.org/
Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In: ARES, Vienna, Austria, IEEE Computer Society, Los Alamitos (2006)
Cuppens, F., Cuppens-Boulahia, N., Ramard, T.: Availability Enforcement by Obligations and Aspects Identification. In: ARES, Vienna, Austria (2006)
Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Nomad: A Security Model with Non Atomic Actions and Deadlines. In: The computer security foundations workshop (CSFW), Aix en Provence, France (2005)
Dijkstra, E.W: A note of two problems in connection with graphs. Sumerisclie Mathematik 1, 269–271 (1959)
Bovet, D.P., Cesati, M.: Understanding the Linux Kernel. O’Reilly (2003)
Purdy, G.N.: Linux Iptables Pocket Reference. O’Reilly (2004)
Hong, F., Hong, L., Fu, C.: Secure OLSR. In: AINA 2005. 19th IEEE International Conference on Advanced Information Networking and Applications, Tamkang University, Taiwan (March 28-30, 2005)
Isida, S., Ando, E., Fukuzawa, Y.: Secure routing functions for OLSR protocol. In: 2005 OLSR Interop and Workshop, Palaiseau, France (July 28–29, 2005)
Kiczales, G.: Aspect-oriented programming. ACM Comput. Surv., 28(4es) (1996)
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. Mobile Computing and Networking, 255–265 (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cuppens, F., Cuppens-Boulahia, N., Ramard, T., Thomas, J. (2007). Misbehaviors Detection to Ensure Availability in OLSR. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_72
Download citation
DOI: https://doi.org/10.1007/978-3-540-77024-4_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77023-7
Online ISBN: 978-3-540-77024-4
eBook Packages: Computer ScienceComputer Science (R0)