Cryptographic Solutions for Secure Information Systems.
Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks†
Article first published online: 17 APR 2012
Copyright © 2012 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 1, pages 108–122, January 2014
How to Cite
Gaur, M. S., Kaur, R., Suresh, L. P. and Laxmi, V. (2014), Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks. Security Comm. Networks, 7: 108–122. doi: 10.1002/sec.545
- Issue published online: 26 DEC 2013
- Article first published online: 17 APR 2012
- collusion attack;
- multipoint relay (MPR);
- OLSR convergence;
Collusion attack is an attack against Optimised Link State Routing (OLSR) protocol in mobile ad hoc network. Two malicious nodes work together so that routes to the target (victim) node(s) are not established in the network. Multipoint relay (MPR) selection process in OLSR is exploited to achieve this route denial. Packet delivery ratio for the target drops to 0% for nodes at distance of 3 hops or more. In this paper, we propose use of convergence characteristics of OLSR in designing effective, resource efficient countermeasures for packet dropping attacks such as collusion attack. We propose a detection method and countermeasure Scruple where discovery packets called ScruplePackets are injected to probe routes from target node to its three-hop neighbours. Acquired information is analysed to conclude if the node is a target of collusion attack. We also propose a novel attack-resistant method named Forced MPR Switching OLSR in which a node temporarily blacklists potential attackers on observing symptoms of the attack, thereby, forcing recomputation of its MPR set. Proposed approaches incur minimal penalty on network performance. Simulations conducted on Network Simulator 3 confirm effectiveness of the proposed method. Copyright © 2012 John Wiley & Sons, Ltd.