[
Next
] [
End
] [
Cover
] [
Contents
]
Contents
Foreword
1
Introduction to wireless networking
1.1
Standards
1.1.1
IEEE 802.11
1.1.2
HiperLAN
1.1.3
Bluetooth
1.2
Architecture
1.2.1
BSS mode
1.2.2
IBSS mode
1.2.3
Ad hoc network
1.3
Advantages and disadvantages
1.4
Routing protocols for ad hoc networks
1.4.1
Reactive protocols
1.4.2
Proactive protocols
1.4.3
Hybrid protocols
1.4.4
The Optimized Link State Routing protocol
2
System security
2.1
Cryptography basics
2.1.1
Symmetric cryptography
2.1.2
Asymmetric cryptography
2.1.3
Symmetric vs. asymmetric cryptography
3
Attacks against ad hoc networks
3.1
Attacks against the routing layer in MANETs
3.1.1
Incorrect traffic generation
3.1.2
Incorrect traffic relaying
3.2
Attacks against the OLSR protocol
3.2.1
Incorrect traffic generation
3.2.2
Incorrect traffic relaying
3.3
Summary of routing attacks
4
Security in ad hoc networks: basic mechanisms
4.1
Protection of the routing protocol
4.2
State of the art
4.2.1
IPsec
4.2.2
Routing protocols using digests or signatures
4.2.3
Other solutions
4.3
Secured versions of OLSR
4.3.1
Packet protection
4.3.2
Message protection
4.3.3
Trust Metric Routing
5
The OLSR signature message
5.1
Specifications
5.1.1
Format of the signature message
5.1.2
The timestamp
5.1.3
The signature algorithms
5.1.4
Applicability to control messages
5.1.5
Optional features
5.1.6
Interoperability with standard OLSR
5.2
Modifications to the standard OLSR protocol
5.2.1
Sending a signed control message
5.2.2
Changes to the Duplicate Set
5.2.3
Receiving and checking a signed control message
5.3
Resilience
5.4
Overhead
5.4.1
Message sizes for the standard OLSR
5.4.2
Message sizes for OLSR with signatures
5.4.3
Flowrates
5.4.4
Comparison with other solutions
6
Cryptosystems for the ad hoc environment
6.1
Requirements
6.2
Algorithm analysis
6.2.1
Benchmarks
6.3
Key management
6.3.1
Threshold cryptography
6.3.2
Self-organized PKI
6.3.3
Identity-based cryptosystems
6.3.4
Imprinting
6.3.5
Probabilistic key distribution
6.3.6
Diffie-Hellman key agreement
6.3.7
A simple PKI for OLSR
7
Timestamps
7.1
No timestamps
7.2
Real-time timestamps
7.3
Non-volatile timestamps
7.4
Clock synchronization
7.4.1
Timestamp exchange protocol
8
Security in ad hoc networks: advanced mechanisms
8.1
Compromised nodes
9
Using multiple signatures in OLSR
9.1
Topology continuity
9.2
Link Atomic Information
9.3
Required proofs
9.4
The Certiproof Table
9.5
The ADVSIG message
9.6
The protocol
9.6.1
Implementation of the algorithm
9.6.2
Outline of the algorithm
9.6.3
Detailed algorithm
9.7
Overhead
9.8
Resilience and remaining vulnerabilities
10
Using information about node location
10.1
State of the art
10.2
GPS-OLSR
10.2.1
Specifications
10.2.2
Resilience
10.2.3
The protocol
10.3
Using a directional antenna to obtain extended accuracy
10.4
Numerical evaluation
10.5
Overhead
11
Detecting bad behaviors
11.1
State of the art
11.1.1
Watchdog/Pathrater
11.1.2
CONFIDANT
11.1.3
WATCHERS
11.2
A trust system for OLSR
11.2.1
Specifications
11.2.2
Punishment and reward
11.2.3
Detection of a misbehaving node: countermeasures
11.2.4
Variations on the theme of trust evaluation
11.2.5
Precise checks on flow conservation
11.3
A last word about enforcing security
12
Conclusion
12.1
Foresights
List of Figures
List of Tables
Bibliography
Security Schemes for the OLSR Protocol for Ad Hoc Networks
Daniele Raffo
PhD Thesis, Université Paris 6 15 SEP 2005
[
Next
] [
Beginning
] [
Cover
] [
Contents
]