期刊文献+

Defending Against Wormhole Attack in OLSR

Defending Against Wormhole Attack in OLSR
下载PDF
导出
摘要 OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoe Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2. OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference , the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.
出处 《Geo-Spatial Information Science》 2006年第3期229-233,共5页 地球空间信息科学学报(英文)
基金 Supported by the Natural Science Foundation of Hubei Province(No.2005ABA243) .
关键词 mobile ad hoc Network wormhole attack OLSR securing routing OLSR 安全选路 网络 机动性
  • 相关文献

参考文献6

  • 1[1]Clausen T,Jacquet P (2003) Optimized link state routing protocol (OLSR)[OL].http://www.ietf.org/rfc/rfc3626.txt
  • 2[2]Hu Yihchun,Perrig A (2004) A survey of secure wireless ad hoc routing[J].IEEE Security and Privacy,2(3):28-39
  • 3[3]Hu Yihchun,Perrig A,Johnson D B (2003) Packet leashes:a defense against wormhole attacks in wireless Networks[C].The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies,San Francisco,CA,USA
  • 4[4]Hu Yihchun,Perrig A,Johnson D B (2003) Rushing attacks and defense in wireless ad hoc Network routing protocols[C].The Workshop on Wireless Security,San Diego,CA,USA
  • 5[5]Hu Lingxuan,Evans D (2004) Using directional antennas to prevent wormhole attacks[C].Network and Distributed System Security Symposium,San Diego,California
  • 6[6]Marsh S (1999) Formalizing trust as a computational concept[D].U.K.:Department of Mathematics and Computer Science,University of Stirling

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部