Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol

Yassine Snoussi, Jean Marc Robert, Hadi Otrok

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In this paper, we identify and propose novel mechanisms to detect possible attacks against the cluster-based OLSR, known as SC-OLSR. Such an energy-efficient routing protocol has been proposed to prolong the network lifetime and motivate selfish nodes to cooperate during the selection of Cluster Heads (CHs) and MultiPoint Relay nodes (MPR). Unfortunately, this protocol is still vulnerable to the presence of malicious nodes. To detect malicious activities, taking into consideration network lifetime, we randomly select a set of nodes that will play the role of intrusion detection monitors. The selected nodes will monitor the behavior of regular nodes, MPRs, and CHs looking for abnormal activities such as the disruption of cluster head election. Our simulation results show that with 50% of monitors we can detect malicious activities with probability more than 70%. According to severity of attacks, intrusion detection nodes can be gradually added and thus our solution is able to consider the tradeoff between security and network lifetime.

Original languageBritish English
Title of host publication2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2011
Pages135-140
Number of pages6
DOIs
StatePublished - 2011
Event2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2011 - Shanghai, China
Duration: 10 Oct 201112 Oct 2011

Publication series

NameInternational Conference on Wireless and Mobile Computing, Networking and Communications
ISSN (Print)2161-9646
ISSN (Electronic)2161-9654

Conference

Conference2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2011
Country/TerritoryChina
CityShanghai
Period10/10/1112/10/11

Keywords

  • Ad hoc networks
  • IDS
  • malicious behavior
  • node clustering
  • OLSR

Fingerprint

Dive into the research topics of 'Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocol'. Together they form a unique fingerprint.

Cite this