Detecting attacks in QoS-OLSR protocol

Hiba Sanadiki, Hadi Otrok, Azzam Mourad, Jean Marc Robert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service (QoS) of the nodes is considered during the selection of the multi-point relays (MPRs) nodes. In this work, we identify two attacks that can be launched against the QoS-OLSR protocol: Identity spoofing attack, and wormhole attack. Watchdogs are used to detect the attacks performed by malicious nodes. As a solution, we propose to improve the watchdogs' detection by (1) using cooperative watchdog model and (2) adding the posterior belief function using Bayes' rule to the watchdog model. Simulation results show that the use of the Bayes' rule function along with the cooperative watchdog model improves the detection rate and reduces the false positives.

Original languageBritish English
Title of host publication2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013
Pages1126-1131
Number of pages6
DOIs
StatePublished - 2013
Event2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013 - Cagliari, Sardinia, Italy
Duration: 1 Jul 20135 Jul 2013

Publication series

Name2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013

Conference

Conference2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013
Country/TerritoryItaly
CityCagliari, Sardinia
Period1/07/135/07/13

Keywords

  • Identity spoofing
  • MANET
  • Posterior belief
  • Watchdogs
  • Wormhole

Fingerprint

Dive into the research topics of 'Detecting attacks in QoS-OLSR protocol'. Together they form a unique fingerprint.

Cite this