Analysis of the node isolation attack against OLSR-based mobile ad hoc networks

Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

34 Citations (Scopus)


Recent advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) which can be applied in infrastructureless situations. However, due to their inherent characteristics, they are much more vulnerable to malicious attacks than a conventinal wired network. In MANET, routing plays an important role in providing connectivity for mobile nodes who are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. However, in hostile environment mobile nodes are susceptible to various types of routing attacks. This paper identifies a new routing attack, called Node Isolation attack, against Optimized Link State Routing (OLSR) protocol, one of the four standard routing protocols for MANETs. We analyze in detail and demonstrate the impact of this attack in order to show the necessity for a countermeasure to guard against the attack. As a first step to defend against the attack, we present a simple technique to detect the attack and identify the source of the attack.

Original languageEnglish
Title of host publicationProceedings of ISCN'06
Subtitle of host publication7th International Symosium on Computer Networks
PublisherIEEE Computer Society
Number of pages6
ISBN (Print)1424404916, 9781424404919
Publication statusPublished - 2006
EventISCN'06: 7th International Symosium on Computer Networks - Istanbul, Turkey
Duration: 2006 Jun 162006 Jun 18

Publication series

NameProceedings of ISCN'06: 7th International Symosium on Computer Networks


ConferenceISCN'06: 7th International Symosium on Computer Networks


  • MPR
  • Node isolation attack
  • OLSR
  • Security


Dive into the research topics of 'Analysis of the node isolation attack against OLSR-based mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this