By Topic

SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Kannhavong, B. ; Grad. Sch. of Inf. Sci., Tohoku Univ., Sendai ; Nakayama, H. ; Jamalipour, A.

Currently, mobile ad hoc network (MANET) has drawn great attention for being part of the ubiquitous network. Unlike the conventional network, MANETs have many unique features such as node resource constraint. That is why several efficient routing protocols have been proposed specifically for MANETs. Among these protocols, optimized link state routing (OLSR) is one of the four important routing protocol identified by IETF. The current OLSR protocol assumes that all nodes are trusted. However, in hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. In this paper, we propose a new security aware optimized link state routing (SA-OLSR) which is a secured version of current OLSR. Our approach is based on exchanging acknowledgement between 2-hop neighbors when the control traffic is successfully received. The main advantage of our approach is that it can protect against many sophisticated attacks such as link spoofing, colluding misrelay attack, and wormhole attack without requiring any location information as well as the knowledge of complete network topology. Our simulation results show that the proposed solution can achieve higher packet delivery ratio compared to the network using the standard OLSR in the presence of malicious nodes.

Published in:

Communications, 2008. ICC '08. IEEE International Conference on

Date of Conference:

19-23 May 2008