Abstract
The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Networks. It operates as a table driven, proactive protocol. The core of the OLSR is the selection of Multipoint Relays (MPRs), used as a component of a flooding mechanism. MPRs distribute control traffic messages within the network while reducing the redundancy in the flooding process. An OLSR node selects its MPR set in a manner that all two hop neighbors are reachable by the minimum number of MPRs. However, if an MPR misbehaves during the control phase, the network connectivity is then compromised. This paper introduces a new Multipoint Relays (MPR) selection algorithm with additional coverage. It also specifies an extension of the OLSR protocol in order to provide multiple disjoint paths especially for dynamic topologies. Disjoint paths are helpful for increasing network throughput, improving forwarding reliability, load balancing and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561 (2003)
Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Internet Draft, draft-ietf-manet-dsr-09 (2003)
Clausen, T., Jaquet, P.: IETF RFC 3626 Optimized Link State Routing Protocol OLSR, October 2003
Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers. In: Proceedings of the ACM SIGCOMM 1994, London, UK, pp. 234–244, October 1994
Su, M.-Y.: WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput. Secur. 29, 208–224 (2010)
Stoleru, R., Wu, H., Chenji, H.: Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Netw. 10, 1179–1190 (2012)
Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting wormhole attacks in wireless sensor networks. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection. IFIP International Federation for Information Processing, vol. 253, pp. 267–279. Springer, Boston (2008)
Naït-Abdesselam, F., Bensaouand, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Commun. Mag. 46(4), 127–133 (2008)
Wang, W., Bhargava, B., Lu, Y., Wu, X.: Defending against wormhole attacks in mobile ad hoc networks. Wirel. Commun. Mob. Com. 6(4), 483–503 (2006)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006)
Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, pp. 612–621, June 2005
Khalil, I., Bagchi, S., Shroff, N.B.: MobiWorp: mitigation of the wormhole attack in mobile multihop wireless networks. In: Proceedings of the IEEE Secure Communication, pp. 1–12, September 2006
Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (IEEE IPDPS 2005), Denver, Colo, USA, p. 289, April 2005
Singh, J., Kaur, L., Gupta, S.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201–207 (2012)
Ji, S., Chen, T., Zhong, S.: Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660–674 (2015)
Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems (ICIIS 2014), pp. 1–6, December 2014
Patel, M., Aggarwal, A.: Two phase wormhole detection approach for dynamic wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2016), Chennai, India pp. 2109–2112, March 2016
Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986 (2003)
Capkun, S., Buttyan, L., Hubaux, J.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21–32 (2003)
Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks. In: Proceedings of the 1st IEEE Security and Privacy Workshops (SPW 2012), pp. 134–141, May 2012
Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, pp. 99–106 (2005)
Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13(1), 27–59 (2007)
The Network Simulator. ns-2. http://www.isi.edu/nsnam/ns/. Accessed 20 June 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zougagh, H., Idboufker, N., El Mourabit, Y., Saadi, Y., Elouaham, S. (2021). Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge. In: Abraham, A., Sasaki, H., Rios, R., Gandhi, N., Singh, U., Ma, K. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2020. Advances in Intelligent Systems and Computing, vol 1372. Springer, Cham. https://doi.org/10.1007/978-3-030-73603-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-73603-3_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73602-6
Online ISBN: 978-3-030-73603-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)