Documente Academic
Documente Profesional
Documente Cultură
for MANET
AbstractAd hoc mobile network usually called MANET optimal routes. The attacker usually up at a strategic location
(Mobile Ad hoc Network) is an autonomous system of mobile and removes all the messages that it must retransmit which
nodes connected by wireless links and forms a temporary network causes a black hole in the network [9].
with a variable topology. MANET work without preexisting fixed
infrastructures and without a centralized administration. The Optimized Link State Routing (OLSR) protocol is one
performance of a MANET network is strictly related to the of the routing protocols exposed to this type of attacks. In
capacity of the routing protocol implemented to adapt itself to the literature, several security extensions of OLSR based on
the unpredictable changes in the network topology and the link cryptography have been proposed [3], [2], [7], [4], [6], [5].
state. One of these routing protocols is OLSR (Optimized Link
State Routing Protocol) which assumes that all the nodes are
Their common point is the use of digital signatures to ensure
in a trusted environment. However OLSR is vulnerable to all authentication and the integrity of control messages. However,
kinds of malicious attacks. In this paper, we proposed a security OLSR is always exposed to the black hole attacks. Indeed, a
mechanism that is an extension of OLSR, called CRY-OLSR. This malicious node can force its election as a Multi Point Relay
new mechanism is based on an asymmetric cryptographic that (MPR) by constantly putting its willingness field equal to
allows the identification and then the isolation of malicious nodes will always in each HELLO packet. Based on the OLSR
in the network. The simulation results, using OPNET simulator, rules, its neighbors will always select the malicious node as
show the effectiveness of our mechanism. MPR. Using this technique, a malicious node can easily obtain
a privileged position in the network. It can then use this
I. I NTRODUCTION position to launch a simple black hole attack or a cooperative
Mobile ad hoc networks, also called MANET (Mobile Ad- one. In this paper, we propose an approach called Crypto
hoc Network) are formed dynamically by a large number of Optimized Link State Routing (CRY OLSR), which is an
mobile stations (nodes) that connect without using an existing extension of the standard OLSR routing protocol to secure
fixed infrastructure and by using wireless interfaces (radio it against the black hole attack.
waves). The nodes can interact and cooperate to exchange The paper is organized as follows: Section 2 presents the
services. These nodes are free to move and organize themselves principle of the new approach CRY OLSR. In Section 3, we
arbitrarily, involving a wide variability in the network topology. discuss the simulation results of the approach compared to the
Each node is able to communicate directly with its neighbors standard OLSR and we conclude the work in Section 4.
(located in its coverage area), and through which they pass to
communicate with more remote nodes which may serve as a
relay for other nodes in the network [8]. II. C RYPTO O PTIMIZED L INK S TATE ROUTING
However, the open nature of these networks allows ma-
licious nodes to access to the exchanged information and to In this section, we present the different assumptions and
introduce attacks and vulnerabilities. Thus, the safety aspect of details of our approach to secure OLSR against basic and
routing protocols in ad hoc networks is difficult to implement cooperative black hole attacks.
in practice. It is one of the main barriers to widespread
deployment of these networks. The research works in this field
are trying to establish a compromise between efficiency and A. Assumptions
robustness of the proposed security solutions and its overall
For the design of our approach, we assume that the
cost.
wireless connections are bidirectional because it requires a
In the literature, several attacks on the MANET have been bi-directional exchange of packets. We also assume that the
identified by researchers. In this paper, we focus on the well- network nodes share a common key. Furthermore, we assume
known black-hole attack. In a BlackHole attack, the malicious that the attack is external (intruder nodes do not have the key
node is trying to attract the most possible paths which allow of a node). Finally, a node S should not trust a neighbor X
controlling most of the data flow through the network. So, the showing characteristics of a malicious node. We note that these
attacker must appear to others as very attractive and presents assumptions are reasonable and achievable in practice.
Parameter Value
Simulation area 1000m X 1000m
Mobility model RWP model
Number of nodes 50
Node speed 20 m/s
Pause time 5s
Hello interval 2.0s
TC interval 5s
Topology Hold time 15.0 s (3xTC INTERVAL)
Physical layer IEEE 802.11
Transmit power 0.001w
Simulation time 1500 seconds (25 minutes).
OLSR.
Fig. 4. The number of sent HELLO messages.
Several simulators for wireless networks have been pro-
posed in recent years, including NS-2, glomosim, jist /
SWANS, GTSNetS, OMNeT ++, Opnet, etc. These simula-
tors offer all an avarice programming environment for the OLSR cannot prevent the black hole attack of TC messages
implementation and the performance evaluation of the com- which involves sending TC messages without being selected as
munication protocols. The availability of standard OLSR code MPR. By cons, the CRY OLSR protocol can detect and stop
in Opnet motivated us to choose it for the validation of the the operation of these attacker nodes and, therefore, reduce
approach. the number of TC messages (this ensures that there will be no
wrong TC messages).
The evaluation of our protocol is done on a network area
of 1000m x 1000m with 50 nodes. The mobility model used
in the simulation is the RWP (Random Way Point) with a
speed of mobility varied between 0 and 20 m/s for each node.
The Topology Hold Time (the expiry time for entries in the
topology table) is fixed to 15s. The TABLE I summarizes the
different network parameters used in the simulation.
In order to evaluate the performance of the CRY OLSR
protocol, we consider the following performance metrics:
Total Hello Message sent: represents the number of
Hello messages sent in the network.
Total TC Message sent: represents the number of TC
messages sent in the network.