Contents

Foreword
1 Introduction to wireless networking
 1.1 Standards
  1.1.1 IEEE 802.11
  1.1.2 HiperLAN
  1.1.3 Bluetooth
 1.2 Architecture
  1.2.1 BSS mode
  1.2.2 IBSS mode
  1.2.3 Ad hoc network
 1.3 Advantages and disadvantages
 1.4 Routing protocols for ad hoc networks
  1.4.1 Reactive protocols
  1.4.2 Proactive protocols
  1.4.3 Hybrid protocols
  1.4.4 The Optimized Link State Routing protocol
2 System security
 2.1 Cryptography basics
  2.1.1 Symmetric cryptography
  2.1.2 Asymmetric cryptography
  2.1.3 Symmetric vs. asymmetric cryptography
3 Attacks against ad hoc networks
 3.1 Attacks against the routing layer in MANETs
  3.1.1 Incorrect traffic generation
  3.1.2 Incorrect traffic relaying
 3.2 Attacks against the OLSR protocol
  3.2.1 Incorrect traffic generation
  3.2.2 Incorrect traffic relaying
 3.3 Summary of routing attacks
4 Security in ad hoc networks: basic mechanisms
 4.1 Protection of the routing protocol
 4.2 State of the art
  4.2.1 IPsec
  4.2.2 Routing protocols using digests or signatures
  4.2.3 Other solutions
 4.3 Secured versions of OLSR
  4.3.1 Packet protection
  4.3.2 Message protection
  4.3.3 Trust Metric Routing
5 The OLSR signature message
 5.1 Specifications
  5.1.1 Format of the signature message
  5.1.2 The timestamp
  5.1.3 The signature algorithms
  5.1.4 Applicability to control messages
  5.1.5 Optional features
  5.1.6 Interoperability with standard OLSR
 5.2 Modifications to the standard OLSR protocol
  5.2.1 Sending a signed control message
  5.2.2 Changes to the Duplicate Set
  5.2.3 Receiving and checking a signed control message
 5.3 Resilience
 5.4 Overhead
  5.4.1 Message sizes for the standard OLSR
  5.4.2 Message sizes for OLSR with signatures
  5.4.3 Flowrates
  5.4.4 Comparison with other solutions
6 Cryptosystems for the ad hoc environment
 6.1 Requirements
 6.2 Algorithm analysis
  6.2.1 Benchmarks
 6.3 Key management
  6.3.1 Threshold cryptography
  6.3.2 Self-organized PKI
  6.3.3 Identity-based cryptosystems
  6.3.4 Imprinting
  6.3.5 Probabilistic key distribution
  6.3.6 Diffie-Hellman key agreement
  6.3.7 A simple PKI for OLSR
7 Timestamps
 7.1 No timestamps
 7.2 Real-time timestamps
 7.3 Non-volatile timestamps
 7.4 Clock synchronization
  7.4.1 Timestamp exchange protocol
8 Security in ad hoc networks: advanced mechanisms
 8.1 Compromised nodes
9 Using multiple signatures in OLSR
 9.1 Topology continuity
 9.2 Link Atomic Information
 9.3 Required proofs
 9.4 The Certiproof Table
 9.5 The ADVSIG message
 9.6 The protocol
  9.6.1 Implementation of the algorithm
  9.6.2 Outline of the algorithm
  9.6.3 Detailed algorithm
 9.7 Overhead
 9.8 Resilience and remaining vulnerabilities
10 Using information about node location
 10.1 State of the art
 10.2 GPS-OLSR
  10.2.1 Specifications
  10.2.2 Resilience
  10.2.3 The protocol
 10.3 Using a directional antenna to obtain extended accuracy
 10.4 Numerical evaluation
 10.5 Overhead
11 Detecting bad behaviors
 11.1 State of the art
  11.1.1 Watchdog/Pathrater
  11.1.2 CONFIDANT
  11.1.3 WATCHERS
 11.2 A trust system for OLSR
  11.2.1 Specifications
  11.2.2 Punishment and reward
  11.2.3 Detection of a misbehaving node: countermeasures
  11.2.4 Variations on the theme of trust evaluation
  11.2.5 Precise checks on flow conservation
 11.3 A last word about enforcing security
12 Conclusion
 12.1 Foresights
List of Figures
List of Tables
Bibliography


Security Schemes for the OLSR Protocol for Ad Hoc Networks        Daniele Raffo        PhD Thesis, Université Paris 6       15 SEP 2005