Mobile Ad-hoc Networks (MANETs) are a major candidate for delivering next-generation self-organizing technologies, and are applicable in multiple environments (i.e. IoT, VANETs, disaster-zones, etc.). The main focus of research, however, is geared towards routing efficiency, self-organization and other "management" issues; hence, the resulting native protocols tend to be vulnerable to various attacks. Over the years, work has been done to improve protocol security, with different solutions proposed for different types of attacks. These solutions, however, often compromise routing efficiency or require network overhead, and many are themselves a new attack venue.
In this talk one major topologically based attack against the Optimized Link State Routing protocol (OLSR) and the similar OSPF-m will be described. We will show how the attack can manifest into a full DoS or the gray- or black-hole attacks. We then describe a solution using fictitious nodes for defending OLSR from these attacks, employing the same tactics used by the attack itself for defense.
Ariel Stulman received his bachelor's degree in Technology and Applied Sciences from the Jerusalem College of Technology, Jerusalem, Israel. He then went on to get an M.Sc. from Bar-Ilan University, Ramat-Gan, Israel, in 2002. In 2005 he achieved a Ph.D. from the University of Reims Chanpagne-Ardenne, Reims, France. As of 2006 he holds a position in the computer department of the Jerusalem College of Technology.
His research interests are in the field of mobile protocol security, geared towards the forth-coming next generation technologies (i.e. IoT, VANETs, etc). He has also done work on software testing, formal methods and real-time systems.
Dr. Stulman is a member of the ACM (Senior) and IEEE, and is the founding director of the Cyber research group at JCT.