Improving the Accessibility of Network Nodes Based on the OLSR Routing Protocol
https://doi.org/10.55648/1998-6920-2025-19-1-20-27
Abstract
The article proposes and investigates a modification of the algorithm for selecting
multipoint relays (MPR) within the OLSR routing protocol, aimed at ensuring protection from
isolation attacks and increasing the accessibility of network nodes. Algorithm was implemented
on the basis of the NS-3 network simulator. An intruder model was proposed, an attack
simulation on the availability of nodes of a self-organizing network was performed, and an
experimental investigation of the developed algorithm was carried out. The results obtained
allowed us to confirm the effectiveness of the developed solution
About the Authors
Daniil Albertovich SerginRussian Federation
postgraduate student of the Department of Complex Information Security, Omsk State Technical University.
Employee of JSC ONIIPP
Maria Vitalievna Shcherba
Russian Federation
PhD, Associate Professor, Department of Integrated Information Security, Omsk State Technical University
Evgeniy Viktorovich Shcherba
Russian Federation
PhD, Associate Professor, Department of Integrated Information Security, Omsk State Technical University
References
1. T. Clausen, C. Dearlove, P. Jacquet, U. Herberg. RFC7181: The Optimized Link State Routing Protocol Version 2.. 2014. available at: https://tools.ietf.org/html/rfc7181 (accessed: 10.04.2024).
2. The Optimized Link State Routing Protocol Evaluation through Experiments and Simulation. Clausen T., Hansen G., Christensen L., Behrmann G. IEEE Symposium on wireless personal mobile communications. Aalborg, Denmark, September 9, 2001. P. 56-62.
3. Clausen T., Herberg U., Yi J. Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2). 2017. RFC 8116. available at: https://tools.ietf.org/html/rfc8116 (accessed: 10.04.2024: 10.04.2024).
4. Shcherba E.V., Nikonov V.I., Litvinov G.A. Obespechenie bezopasnosti protokolov marshrutizacii dlya telekommunikacionnyh setej s dinamicheskoj topologiej [Ensuring the security of routing protocols for telecommunication networks with dynamic topology]. Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioelektroniki. 2018. vol. 21. no 3. pp. 19–29.
5. Litvinov G. A., Shcherba E. V. Modeling Message Spoofing Attacks on the OLSR Routing Protocol. 2019 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). Yekaterinburg, 2019. pp. 299-302.
6. Malik D., Mahajan K., Rizvi M. A. Security for node isolation attack on OLSR by modifying MPR selection process. 2014 First International Conference on Networks & Soft Computing (ICNSC2014). Guntur, India, 2014. pp. 102-106.
7. Nabou A., Laanaoui M.D., Ouzzif M. New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. Wireless Personal Communications. 2021. Vol. 117. pp. 525-544.
8. Idboufker N., Mssassi S., Alaoui C. M., Zougagh H. Election of MPR Nodes and Detection of Malicious Nodes Based on a Byzantine Fault in the OLSR Protocol Case of a Scale-Free Network. Electronics. 2023. Vol. 12. no 16. 3390.
9. Riley G. F., Henderson T. R. The ns-3 network simulator. Modeling and tools for network simulation. 2010. pp. 15-34.
10.
Review
For citations:
Sergin D.A., Shcherba M.V., Shcherba E.V. Improving the Accessibility of Network Nodes Based on the OLSR Routing Protocol. The Herald of the Siberian State University of Telecommunications and Information Science. 2025;19(1):20-27. (In Russ.) https://doi.org/10.55648/1998-6920-2025-19-1-20-27