Security Enhancement Mechanism for Ad-Hoc OLSR Protocol

  • Inshil Doh
  • Kijoon Chae
  • Howon Kim
  • Kyoil Chung
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3961)


In this paper, we propose security mechanism for Ad-hoc OLSR protocol. We consider the security vulnerabilities for OLSR and apply one-time digital signature for lightweight authentication of the routing messages. We also propose compromised node management mechanism in which normal nodes collaborate to report malfunctioning nodes and to isolate them from network. We finally analyze the security and overhead of our mechanism.


Hash Function Neighbor Node Hash Table Malicious Node Control Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Perkins, C., Belding-Royer, E.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561, Experimental (July 2003)Google Scholar
  2. 2.
    Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The dynamic source routing protocol for mobile ad hoc networks (DSR), Internet-Draft, draft-ietf-manet-dsr-08.txt (February 24, 2003)Google Scholar
  3. 3.
    Clausen, T., Jacquet, P. (eds.): Optimized link state routing protocol (OLSR). RFC 3626, Experimental (October 2003)Google Scholar
  4. 4.
    Ogier, R., Templin, F., Lewis, M.: Topology dissemination based on reverse-path forwarding (TBRPF), RFC 3684, Experimental (February 2004)Google Scholar
  5. 5.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proc. the 8th ACM International Conference on Mobile Computing and Networking (September 2002)Google Scholar
  6. 6.
    Perrig, A., et al.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. IEEE Symp. Security and Privacy, pp. 56–73. IEEE Press, Los Alamitos (2000)Google Scholar
  7. 7.
    Zapata, M.G.: Secure ad hoc on-demand distance vector (SAODV) routing, Internet-Draft, draft-guerrero-manet-saodv-00.txt (October 2002)Google Scholar
  8. 8.
    Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile ad-hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002, pp. 27–31 (2002)Google Scholar
  9. 9.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–89. IEEE Computer Society Press, Los Alamitos (2002)CrossRefGoogle Scholar
  10. 10.
    Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Calicoon, NY, USA (June 2002)Google Scholar
  11. 11.
    Lamport, L.: Constructing digital signatures from oneway function, Technical Report SRI-CSL-98, SRI International (October 1979)Google Scholar
  12. 12.
    Merkle, R.C.: A Digital Signature Based on a Conventional Encryption Function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
  13. 13.
    Rivest, R.L.: The MD5 Message Digest Algorithm, RFC1321 (April 1992)Google Scholar
  14. 14.
    Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. SIGCOMM 1994 Conf. Communications Architectures, Protocols and Applications, pp. 234–244. ACM Press, New York (1994)CrossRefGoogle Scholar
  15. 15.
    Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: An Advanced Signature System for OLSR. In: Proc. SASN 2004 (October 2004)Google Scholar
  16. 16.
    Hafslund, A., Tonnesen, A., Rotvik, R.B., Andersson, J., Kure, O.: Secure Extension to the OLSR protocol. In: OLSR Interop and Workshop (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Inshil Doh
    • 1
  • Kijoon Chae
    • 1
  • Howon Kim
    • 2
  • Kyoil Chung
    • 2
  1. 1.Dept. of Computer Science and EngineeringEwha Womans UniversityKorea
  2. 2.Electronics and Telecommunications Research InstituteKorea

Personalised recommendations