
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,427 |
Article View | 9,188,648 |
PDF Download | 5,620,936 |
Formal Analysis of Security Vulnerabilities in OLSR Routing Protocol Using SPAN Tool | ||
پدافند الکترونیکی و سایبری | ||
Article 6, Volume 12, Issue 3 - Serial Number 47, November 2024, Pages 61-71 PDF (977.72 K) | ||
Document Type: Original Article | ||
Authors | ||
Ali Naghash Asadi* 1; Mohammad Abdollahi Azgomi2 | ||
1Assistant Professor, Foman Technical College, Tehran University Technical College, Tehran, Iran | ||
2Professor, University of Science and Technology, Tehran, Iran | ||
Receive Date: 11 July 2024, Revise Date: 13 September 2024, Accept Date: 27 September 2024 | ||
Abstract | ||
Ad-hoc mobile networks are used in various fields. These networks require special routing protocols due to their characteristics. These protocols usually focus on providing better service and more efficiency and ignore security issues. Therefore, there are many threats including sniffing, tampering, and spoofing in these networks. Among these routing protocols, we can refer to the optimized link state routing protocol, or OLSR for short. The main purpose of this protocol is to prevent the unnecessary sending of control packets so that less congestion is created in network traffic and efficiency and service are improved. However, no security considerations are defined for the OLSR protocol, and thus it is the target of many attacks. There are researches in which the security of the OLSR protocol has been investigated, but in none of them, no comprehensive security analysis has been provided using formal methods. In this paper, a formal method based on the SPAN tool has been presented for the security analysis of the OLSR protocol, by using which the vulnerabilities reported for it have been identified and confirmed. Finally, cryptography-based solutions have been proposed to address these vulnerabilities. | ||
Keywords | ||
OLSR protocol; Security vulnerabilities; Formal analysis; SPAN tool | ||
Main Subjects | ||
Information security, encryption, encryption, protocols and standards | ||
References | ||
[1]. N. Raza, M. U. Aftab, M. Q. Akbar, O. Ashraf and M. Irfan, "Mobile Ad-Hoc Networks Applications and Its Challenges," Communications and Network, vol. 8, no. 3, pp. 131-136, 2016. | ||
Statistics Article View: 229 PDF Download: 45 |