Cryptographic Solutions for Secure Information Systems.
Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks†
Article first published online: 17 APR 2012
Copyright © 2012 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 1, pages 108–122, January 2014
How to Cite
Gaur, M. S., Kaur, R., Suresh, L. P. and Laxmi, V. (2014), Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks. Security Comm. Networks, 7: 108–122. doi: 10.1002/sec.545
- Issue published online: 26 DEC 2013
- Article first published online: 17 APR 2012
- 1A survey on attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Springer Series on Signals and Communication Technology, Xiao Y, Shen X, Du D-Z (ed). Chapter 5, 2007; 103–135., , , .
- 2Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. rfc2501, 1999. www.ietf.org/rfc/rfc2501.txt., .
- 4A collusion attack against OLSR-based mobile ad hoc networks. In Global Telecommunications Conference, 2006. GLOBECOM '06, IEEE. 2006; 1–5., , .
- 6Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. SIGCOMM Computer Communication Review 1994; 24(4):234–244., .
- 7Optimized link state routing protocol for ad hoc networks. rfc3626, 2001; page 47. www.ietf.org/rfc/rfc3626.txt, , , , , .
- 8DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, Perkins CE (ed). Chapter 5, Dorling Kindersley, Pearson Education: Delhi, India, 2008; 139–172., , .
- 9The Ad Hoc On-demand Distance-vector Protocol. In Ad Hoc Networking, Perkins CE (ed). Chapter 6, Dorling Kindersley, Pearson Education: Delhi, India, 2008; 173–219., .
- 10Multipoint relaying: an efficient technique for flooding in mobile wireless networks. 35th Annual Hawaii International Conference on System Sciences HICSS02, Volume 9, Jan 7 - 10, Hawaii, USA, IEEE Computer Society: Los Alamitos, USA, 2002; 298., , .
- 11On the prevention of collusion attack in OLSR-based mobile ad hoc networks. IEEE International Conference on Networks (ICON 2008), New Delhi, India, 2008; 1–6., , .
- 13A collusion attack detection method for OLSR-based MANETS employing scruple packets. Proceedings of the ACM 3rd International Conference on Security of Information and Networks, SIN' 10, New York, NY, USA, 2010; 256–262., , , .
- 14Network simulator 3. http://www.nsnam.org.
- 15Collusion attack resistance through forced MPR switching in OLSR. In IEEEXplore IFIP Wireless Days. 2010; 1–5., , , .