2018
Thomas Clausen; Jiazi YI; Juan Antonio Cordero; Yuichi Igarashi
Use 'em or Lose 'em: On Unidirectional Links in Reactive Routing Protocols Journal Article
In: Elsevier Ad Hoc Networks, vol. 73, 2018.
Abstract | Links | BibTeX | Tags: Ad-Hoc, LLN, LOADng, MANET, Reactive, Routing
@article{Clausen2018unidirectional,
title = {Use 'em or Lose 'em: On Unidirectional Links in Reactive Routing Protocols},
author = {Thomas Clausen and Jiazi YI and Juan Antonio Cordero and Yuichi Igarashi},
url = {https://www.sciencedirect.com/science/article/pii/S1570870518300325
https://ac.els-cdn.com/S1570870518300325/1-s2.0-S1570870518300325-main.pdf?_tid=0b7f4a7e-b489-4317-b96c-f18cec2af56f&acdnat=1520779362_84dbf04f92cfc3c7ef2448f3b4c3ebf7},
doi = {10.1016/j.adhoc.2018.02.004},
year = {2018},
date = {2018-05-01},
journal = {Elsevier Ad Hoc Networks},
volume = {73},
abstract = {In reactive unicast routing protocols, Route Discovery aims to include only bidirectional links in discovered routing paths. This is typically accomplished by having routers maintain a “blacklist” of links recently confirmed (through Route Reply processing) to be unidirectional – which is then used for excluding subsequent Route Discovery control messages received over these links from being processed and forwarded.
This paper first presents an analytical model, which allows to study the impact of unidirectional links being present in a network, on the performance of reactive routing protocols. Next, this paper identifies that despite the use of a “blacklist”, the Route Discovery process may result in discovery of false forward routes, i.e., routes containing unidirec- tional links – and proposes a counter-measure denoted Forward Bidirectionality Check. This paper further proposes a Loop Exploration mechanism, allowing to properly include unidirectional links in a discovered routing topology – with the goal of providing bidirectional connectivity even in absence of bidirectional paths in the network.
Finally, each of these proposed mechanisms are subjected to extensive network simulations in static scenarios. When the fraction of unidirectional links is moderate (15 50%), simulations find Forward Bidirectionality Check to significantly increase the probability that bidirectional routing paths can be discovered by a reactive routing protocol, while incurring only an insignificant additional overhead. Further, in networks with a significant fraction of unidirectional links ( 50%), simulations reveal that Loop Exploration preserves the ability of a reactive routing protocol to establish bidirectional communication (possibly through non-bidirectional paths), but at the expense of a substantial additional overhead.},
keywords = {Ad-Hoc, LLN, LOADng, MANET, Reactive, Routing},
pubstate = {published},
tppubtype = {article}
}
This paper first presents an analytical model, which allows to study the impact of unidirectional links being present in a network, on the performance of reactive routing protocols. Next, this paper identifies that despite the use of a “blacklist”, the Route Discovery process may result in discovery of false forward routes, i.e., routes containing unidirec- tional links – and proposes a counter-measure denoted Forward Bidirectionality Check. This paper further proposes a Loop Exploration mechanism, allowing to properly include unidirectional links in a discovered routing topology – with the goal of providing bidirectional connectivity even in absence of bidirectional paths in the network.
Finally, each of these proposed mechanisms are subjected to extensive network simulations in static scenarios. When the fraction of unidirectional links is moderate (15 50%), simulations find Forward Bidirectionality Check to significantly increase the probability that bidirectional routing paths can be discovered by a reactive routing protocol, while incurring only an insignificant additional overhead. Further, in networks with a significant fraction of unidirectional links ( 50%), simulations reveal that Loop Exploration preserves the ability of a reactive routing protocol to establish bidirectional communication (possibly through non-bidirectional paths), but at the expense of a substantial additional overhead.
2017
Thomas Clausen; Jiazi Yi; Ulrich Herberg
Lightweight On-demand Ad hoc Distance-vector Routing-Next Generation (LOADng): Protocol, Extension, and Applicability Journal Article
In: Elsevier Computer Networks, vol. 126, pp. 125-140, 2017.
Abstract | Links | BibTeX | Tags: Ad-Hoc, LLN, LOADng
@article{clausen2017lightweight,
title = {Lightweight On-demand Ad hoc Distance-vector Routing-Next Generation (LOADng): Protocol, Extension, and Applicability},
author = {Thomas Clausen and Jiazi Yi and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2017/08/2017-Computer-Networks-Lightweight-On-demand-Ad-hoc-Distance-vector-Routing-Next-Generation-LOADng.pdf},
doi = {10.1016/j.comnet.2017.06.025},
year = {2017},
date = {2017-10-24},
journal = {Elsevier Computer Networks},
volume = {126},
pages = {125-140},
publisher = {Elsevier},
abstract = {This paper studies the routing protocol “Lightweight On-demand Ad hoc Distance-vector Routing Protocol – Next Generation (LOADng)”, designed to enable efficient, scalable and secure routing in low power and lossy networks. As a reactive protocol, it does not maintain a routing table for all destinations in the network, but initiates a route discovery to a destination only when there is data to be sent to that destination to reduce routing overhead and memory consumption. Designed with a modular approach, LOADng can be extended with additional components for adapting the protocol to different topologies, traffic, and data-link layer characteristics. This paper studies several such additional components for extending LOADng: support for smart route requests and expanding ring search, an extension permitting maintaining collection trees, a fast rerouting extension. All those extensions are examined from the aspects of specification, interoperability with other mechanisms, security vulnerabilities, performance and applicability. A general framework is also proposed to secure the routing protocol.},
keywords = {Ad-Hoc, LLN, LOADng},
pubstate = {published},
tppubtype = {article}
}
Thomas Clausen; Ulrich Herberg; Jiazi Yi
RFC8116: Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
RFC 8116, 2017.
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OLSR, OLSR Security, OLSRv2, RFC, Security, Standard
@misc{rfc8116,
title = {RFC8116: Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg and Jiazi Yi},
url = {http://www.thomasclausen.net/wp-content/uploads/2017/05/rfc8116.pdf},
doi = {10.17487/rfc8116},
year = {2017},
date = {2017-01-01},
number = {8116},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document analyzes common security threats to the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It also analyzes which of these security vulnerabilities can be mitigated when using the mandatory-to-implement security mechanisms for OLSRv2 and how the vulnerabilities are mitigated.},
howpublished = {RFC 8116},
keywords = {Ad-Hoc, IETF, MANET, MESH, OLSR, OLSR Security, OLSRv2, RFC, Security, Standard},
pubstate = {published},
tppubtype = {misc}
}
2016
Ulrich Herberg; Robert Cole; Ian Chakeres; Thomas Clausen
RFC7939: Definition of Managed Objects for the Neighborhood Discovery Protocol Miscellaneous
IETF - Proposed Standard RFC 7939, 2016, ISSN: 2070-1721.
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MIB, Network Management, NHDP, OLSRv2, RFC
@misc{rfc7939,
title = {RFC7939: Definition of Managed Objects for the Neighborhood Discovery Protocol},
author = {Ulrich Herberg and Robert Cole and Ian Chakeres and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2016/09/RFC7939.pdf},
doi = {10.17487/rfc7939},
issn = {2070-1721},
year = {2016},
date = {2016-01-01},
number = {7939},
publisher = {RFC Editor},
series = {Request for Comments},
abstract = {This document replaces RFC 6779; it contains revisions and extensions to the original document. It defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes objects for configuring parameters of the Neighborhood Discovery Protocol (NHDP) process on a router. The extensions described in this document add objects and values to support the NHDP optimization specified in RFC 7466. The MIB module defined in this document, denoted NHDP-MIB, also reports state, performance information, and notifications about NHDP. This additional state and performance information is useful to troubleshoot problems and performance issues during neighbor discovery.},
howpublished = {IETF - Proposed Standard RFC 7939},
keywords = {Ad-Hoc, IETF, MANET, MIB, Network Management, NHDP, OLSRv2, RFC},
pubstate = {published},
tppubtype = {misc}
}
2015
Christopher Dearlove; Thomas Clausen
RFC7722: Multi-Topology Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2) Miscellaneous
IETF - Experimental RFC 7722, 2015, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7722).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, OLSRv2, RFC
@misc{RFC7722,
title = {RFC7722: Multi-Topology Extension for the Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Christopher Dearlove and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7722.txt.pdf},
doi = {10.17487/RFC7722},
issn = {2070-1721},
year = {2015},
date = {2015-12-31},
abstract = {This specification describes an extension to the Optimized Link State Routing Protocol version 2 (OLSRv2) to support multiple routing topologies, while retaining interoperability with OLSRv2 routers that do not implement this extension. This specification updates RFCs 7188 and 7631 by modifying and extending TLV registries and descriptions.},
howpublished = {IETF - Experimental RFC 7722},
note = {http://tools.ietf.org/html/rfc7722},
keywords = {Ad-Hoc, IETF, MANET, OLSRv2, RFC},
pubstate = {published},
tppubtype = {misc}
}
Thomas Clausen; Christopher Dearlove
RFC7631 – TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format Miscellaneous
IETF - Proposed Standard RFC 7631, 2015, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7631).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OLSR, OLSRv2, RFC, Standard
@misc{RFC7631,
title = {RFC7631 – TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format},
author = {Thomas Clausen and Christopher Dearlove},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7631.txt.pdf},
doi = {10.17487/RFC7631},
issn = {2070-1721},
year = {2015},
date = {2015-09-01},
abstract = {This document reorganizes the naming of already-allocated TLV (type-length-value) types and type extensions in the "Mobile Ad hoc NETwork (MANET) Parameters" registries defined by RFC 5444 to use names appropriately. It has no consequences in terms of any protocol implementation. This document also updates the Expert Review guidelines in RFC 5444, so as to establish a policy for consistent naming of future TLV type and type extension allocations. It makes no other changes to RFC 5444.},
howpublished = {IETF - Proposed Standard RFC 7631},
note = {http://tools.ietf.org/html/rfc7631},
keywords = {Ad-Hoc, IETF, MANET, MESH, OLSR, OLSRv2, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Christopher Dearlove; Thomas Clausen
RFC7466: An Optimization for the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) Miscellaneous
IETF - Proposed Standard RFC 7466, 2015, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7466).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, NHDP, RFC, Standard
@misc{RFC7466,
title = {RFC7466: An Optimization for the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)},
author = {Christopher Dearlove and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7466.pdf
},
doi = {10.17487/RFC7466},
issn = {2070-1721},
year = {2015},
date = {2015-03-01},
abstract = {The link quality mechanism of the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) enables "ignoring" some 1-hop neighbors if the measured link quality from that 1-hop neighbor is below an acceptable threshold while still retaining the corresponding link information as acquired from the HELLO message exchange. This allows immediate reinstatement of the 1-hop neighbor if the link quality later improves sufficiently. NHDP also collects information about symmetric 2-hop neighbors. However, it specifies that if a link from a symmetric 1-hop neighbor ceases being symmetric, including while "ignored" (as described above), then corresponding symmetric 2-hop neighbors are removed. This may lead to symmetric 2-hop neighborhood information being permanently removed (until further HELLO messages are received) if the link quality of a symmetric 1-hop neighbor drops below the acceptable threshold, even if only for a moment. This specification updates RFC 6130 "Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)" and RFC 7181 "The Optimized Link State Routing Protocol Version 2 (OLSRv2)" to permit, as an option, retaining, but ignoring, symmetric 2-hop information when the link quality from the corresponding 1-hop neighbor drops below the acceptable threshold. This allows immediate reinstatement of the symmetric 2-hop neighbor if the link quality later improves sufficiently, thus making the symmetric 2-hop neighborhood more "robust".},
howpublished = {IETF - Proposed Standard RFC 7466},
note = {http://tools.ietf.org/html/rfc7466},
keywords = {Ad-Hoc, IETF, MANET, NHDP, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
2014
Ulrich Herberg; Thomas Clausen; Christopher Dearlove
RFC7182: Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs) Miscellaneous
IETF - Proposed Standard RFC 7182, 2014, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7182).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, OLSRv2, RFC, Standard
@misc{RFC7182,
title = {RFC7182: Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs)},
author = {Ulrich Herberg and Thomas Clausen and Christopher Dearlove},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7182.pdf
},
doi = {10.17487/RFC7182},
issn = {2070-1721},
year = {2014},
date = {2014-04-01},
abstract = {This document revises, extends, and replaces RFC 6622. It describes general and flexible TLVs for representing cryptographic Integrity Check Values (ICVs) and timestamps, using the generalized Mobile Ad Hoc Network (MANET) packet/message format defined in RFC 5444. It defines two Packet TLVs, two Message TLVs, and two Address Block TLVs for affixing ICVs and timestamps to a packet, a message, and one or more addresses, respectively.},
howpublished = {IETF - Proposed Standard RFC 7182},
note = {http://tools.ietf.org/html/rfc7182},
keywords = {Ad-Hoc, IETF, MANET, OLSRv2, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Ulrich Herberg; Robert G. Cole; Thomas Clausen
RFC7184: Definition of Managed Objects for the Optimized Link State Routing Protocol Version 2 Miscellaneous
IETF - Proposed Standard RFC 7184, 2014, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7184).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, Network Management, OLSRv2, RFC, Standard
@misc{RFC7184,
title = {RFC7184: Definition of Managed Objects for the Optimized Link State Routing Protocol Version 2},
author = {Ulrich Herberg and Robert G. Cole and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc7184.pdf
},
doi = {10.17487/RFC7184},
issn = {2070-1721},
year = {2014},
date = {2014-04-01},
abstract = {This document defines the Management Information Base (MIB) module for configuring and managing the Optimized Link State Routing Protocol version 2 (OLSRv2). The OLSRv2-MIB module is structured into configuration information, state information, performance information, and notifications. This additional state and performance information is useful for troubleshooting problems and performance issues of the routing protocol. Two levels of compliance allow this MIB module to be deployed on constrained routers.},
howpublished = {IETF - Proposed Standard RFC 7184},
note = {http://tools.ietf.org/html/rfc7184},
keywords = {Ad-Hoc, IETF, MANET, Network Management, OLSRv2, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Ulrich Herberg; Christopher Dearlove; Thomas Clausen
IETF - Proposed Standard RFC 7183, 2014, ISSN: 2070-1721, (http://tools.ietf.org/html/rfc7183).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, NHDP, OLSR Security, OLSRv2, RFC
@misc{RFC7183,
title = {RFC7183: Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)},
author = {Ulrich Herberg and Christopher Dearlove and Thomas Clausen},
url = {https://epizeuxis.net/site/wp-content/uploads/2015/12/rfc7183.pdf
},
doi = {10.17487/RFC7183},
issn = {2070-1721},
year = {2014},
date = {2014-04-01},
abstract = {This document specifies integrity and replay protection for the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) and the Optimized Link State Routing Protocol version 2 (OLSRv2). This protection is achieved by using an HMAC-SHA-256 Integrity Check Value (ICV) TLV and a Timestamp TLV based on Portable Operating System Interface (POSIX) time. The mechanism in this specification can also be used for other protocols that use the generalized packet/message format described in RFC 5444. This document updates RFC 6130 and RFC 7181 by mandating the implementation of this integrity and replay protection in NHDP and OLSRv2.},
howpublished = {IETF - Proposed Standard RFC 7183},
note = {http://tools.ietf.org/html/rfc7183},
keywords = {Ad-Hoc, IETF, MANET, NHDP, OLSR Security, OLSRv2, RFC},
pubstate = {published},
tppubtype = {misc}
}
2013
Jiazi Yi; Juan Antonio Cordero; Thomas Clausen
Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks Proceedings Article
In: The 16th International Conference on Network-Based Information Systems (NBiS-2013), 2013.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Jitter, LOADng, MANET, MESH, SOGRID
@inproceedings{Clausen2013g,
title = {Jitter Considerations in On-demand Route Discovery for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Juan Antonio Cordero and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-NBIS-Jitter-Considerations-in-On-demand-Route-Discovery-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/NBiS.2013.28},
year = {2013},
date = {2013-09-01},
publisher = {The 16th International Conference on Network-Based Information Systems (NBiS-2013)},
abstract = {Jittering (a small, random variation in timing of control message emission) is widely used in protocols for wireless communication, in order to avoid simultaneous packet transmis- sions over the same channel by adjacent nodes in the network. Used for both regularly scheduled packets, for event-triggered packets, and for scheduled resets in the network, jittering is a particularly important mechanism when a network event may cause multiple adjacent nodes to react concurrently. Introduced in the proactive MANET routing protocol OLSR, the “LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation” (LOADng), a derivative of AODV, is specified so as to also use jitter for flooding Route Request (RREQ) messages during route discovery. This use of jitter in RREQ flooding is, however, not without drawbacks, which are identified and addressed in this paper within the framework of a more general study of jitter mechanisms used for route discovery in reactive routing protocols. The paper studies the behavior of route discovery when using “naive” jitter (simply, delaying RREQ retransmission by a small uniformly distributed random delay), in order to identify and analyze the problems hereof, mostly related to route sub-optimality and excessive control traffic overhead. A Window Jitter mechanism is then proposed to address these issues – with the performance hereof, when compared to “naive” jitter being evaluated by way of modeling, theoretical analysis and experiments. The paper shows that the use of Window Jitter improves indeed the efficiency of route discovery in AODV and overcome the drawbacks identified for “naive” jitter.},
keywords = {Ad-Hoc, Jitter, LOADng, MANET, MESH, SOGRID},
pubstate = {published},
tppubtype = {inproceedings}
}
Juan Antonio Cordero; Jiazi Yi; Thomas Clausen
Optimization of jitter configuration for reactive route discovery in wireless mesh networks Proceedings Article
In: Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on, 2013, ISBN: 978-1-61284-824-2.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Jitter, LOADng, MANET, MESH
@inproceedings{Clausen2013c,
title = {Optimization of jitter configuration for reactive route discovery in wireless mesh networks},
author = {Juan Antonio Cordero and Jiazi Yi and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2013-WiOpt-Optimization-of-Jitter-Configuration-for-Reactive-Route-Discovery-in-Wireless-Mesh-Networks.pdf},
isbn = {978-1-61284-824-2},
year = {2013},
date = {2013-05-01},
publisher = {Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on},
abstract = {Jitter is a small, random variation of timing before message emission that is widely used in non-synchronized wireless communication. It is employed to avoid collisions caused by simultaneous transmissions by adjacent nodes over the same channel. In reactive (on-demand) routing protocols, such as AODV and LOADng, it is recommended to use jitter during the flooding of Route Request messages. This paper analyzes the cost of jitter mechanisms in route discovery of on-demand routing protocols, and examines the drawbacks of the standard and commonly used uniformly distributed jitter. The main studied drawback is denominated delay inversion effect. Two variations on the jitter mechanism --window jitter and adaptive jitter-- are proposed to address this effect, which take the presence and the quality of traversed links into consideration to determine the per-hop forwarding delay. These variations allow to effectively reduce the routing overhead, and increase the quality of the computed paths with respect to the standard uniform jitter mechanism. Simulations are also performed to compare the performance of different jitter settings in various network scenarios.},
keywords = {Ad-Hoc, Jitter, LOADng, MANET, MESH},
pubstate = {published},
tppubtype = {inproceedings}
}
2012
Jiazi Yi; Thomas Clausen
Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks Proceedings Article
In: The 15th International Conference on Network-Based Information Systems (NBiS-2012), 2012.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, Security, SMF, SMF Security
@inproceedings{Yi2012,
title = {Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2012-NBIS-Vulnerability-Analysis-of-Relay-Set-Selection-Algorithms-for-the-Simplified-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/NBiS.2012.48},
year = {2012},
date = {2012-09-01},
publisher = {The 15th International Conference on Network-Based Information Systems (NBiS-2012)},
abstract = {After more than a decade of research and stan-dardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in “the real world” also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This paper studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.},
keywords = {Ad-Hoc, MANET, MESH, Security, SMF, SMF Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Ulrich Herberg
RFC6622: Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs) Miscellaneous
2012, (http://tools.ietf.org/html/rfc6622).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OLSR, OLSR Security, OLSRv2, RFC, Standard
@misc{Clausen2012,
title = {RFC6622: Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs)},
author = {Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc6622.txt.pdf},
doi = {10.17487/RFC6622},
year = {2012},
date = {2012-05-01},
publisher = {IETF - Std. Track RFC 6622},
organization = {The Internet Engineering Task Force},
abstract = {This document describes general and flexible TLVs for representing cryptographic Integrity Check Values (ICVs) (i.e., digital signatures or Message Authentication Codes (MACs)) as well as timestamps, using the generalized Mobile Ad Hoc Network (MANET) packet/message format defined in RFC 5444. It defines two Packet TLVs, two Message TLVs, and two Address Block TLVs for affixing ICVs and timestamps to a packet, a message, and an address, respectively. },
note = {http://tools.ietf.org/html/rfc6622},
keywords = {Ad-Hoc, IETF, MANET, MESH, OLSR, OLSR Security, OLSRv2, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
2011
Ulrich Herberg; Thomas Clausen
Delay Tolerant Routing with OLSRv2 Proceedings Article
In: Proceedings of the The 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), 2011.
Abstract | Links | BibTeX | Tags: Ad-Hoc, DTN, MANET, MESH, OLSR, OLSRv2
@inproceedings{Herberg2011,
title = {Delay Tolerant Routing with OLSRv2},
author = {Ulrich Herberg and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-EUC-Delay-Tolerant-Networking-with-OLSRv2.pdf},
doi = {10.1109/EUC.2011.27},
year = {2011},
date = {2011-10-01},
publisher = {Proceedings of the The 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)},
abstract = {This paper proposes a simple mechanism for en-abling basic delay tolerant networking with off-the-shelf MANET routing protocols – with the objective being to enable trading off slightly longer data delivery delays against resilience to a temporary lack of connectivity between a router and the ultimate destination of an IP datagram. As part of testing the benefit of said mechanism, an extreme network mobility model is proposed, entitled the “PopUp model”: a router appears in the network, and operates normally – then may disable and disappear from the network to appear later elsewhere. Observed to cause severely degraded performance for MANET routing protocols, this model is used for testing the proposed mechanism in OLSRv2-routed MANETs. The proposed mechanism shows to vastly increase the data delivery ration, with reasonably low increases in delays and control traffic overhead incurred.},
keywords = {Ad-Hoc, DTN, MANET, MESH, OLSR, OLSRv2},
pubstate = {published},
tppubtype = {inproceedings}
}
Jiazi Yi; Thomas Clausen; Ulrich Herberg
Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks Proceedings Article
In: IEEE CPSCom 2011, 2011, (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260).
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, Security, SMF, SMF Security
@inproceedings{Yi2011c,
title = {Vulnerability Analysis of the SMF Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-CPScom-Vulnerability-Analysis-of-the-Simple-Multicast-Forwarding-SMF-Protocol-for-Mobile-Ad-Hoc-Networks.pdf},
doi = {10.1109/iThings/CPSCom.2011.63},
year = {2011},
date = {2011-10-01},
publisher = {IEEE CPSCom 2011},
abstract = {If deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside of purely experimental settings, protocols operating such MANETs must be able to preserve network integrity, even when faced with careless or malicious participants. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol(s), managing the connectivity. Understanding how these routing protocols can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. One routing protocol for MANETs, developed by the Internet Engineering Task Force (IETF) as a multicast routing protocol for efficient data dissemination, is denoted "Simplified Multicast Forwarding'' (SMF). This protocol is analyzed, and its vulnerabilities described, in this paper. SMF consists of two independent components: (i) duplicate packet detection and (ii) relay set selection, each of which presents its own set of vulnerabilities that an attacker may exploit to compromise network integrity. This paper explores vulnerabilities in each of these, with the aim of identifying attack vectors and thus enabling development of countermeasures.},
note = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6142260},
keywords = {Ad-Hoc, MANET, MESH, Security, SMF, SMF Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Jiazi Yi; Thomas Clausen; Ulrich Herberg
Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks Technical Report
2011.
BibTeX | Tags: Ad-Hoc, MANET, MESH, SMF, SMF Security
@techreport{LIX-NET-RR-106,
title = {Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks},
author = {Jiazi Yi and Thomas Clausen and Ulrich Herberg},
year = {2011},
date = {2011-06-01},
publisher = {INRIA Research Report 7638},
keywords = {Ad-Hoc, MANET, MESH, SMF, SMF Security},
pubstate = {published},
tppubtype = {techreport}
}
Ulrich Herberg; Thomas Clausen
Delay Tolerant Routing with OLSRv2 Technical Report
2011.
BibTeX | Tags: Ad-Hoc, DTN, MANET, MESH, OLSR, OLSRv2
@techreport{Herberg2011,
title = {Delay Tolerant Routing with OLSRv2},
author = {Ulrich Herberg and Thomas Clausen},
year = {2011},
date = {2011-06-01},
publisher = {INRIA Research Report 7662},
keywords = {Ad-Hoc, DTN, MANET, MESH, OLSR, OLSRv2},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen; Christopher Dearlove; Justin Dean
RFC6130: Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) Miscellaneous
2011, (http://tools.ietf.org/html/rfc6130).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, NHDP, OLSR, OLSRv2, RFC, Standard
@misc{Clausen2011bb,
title = {RFC6130: Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)},
author = {Thomas Clausen and Christopher Dearlove and Justin Dean},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc6130.txt.pdf},
doi = {10.17487/RFC6130},
year = {2011},
date = {2011-03-01},
publisher = {IETF - Std. Track RFC 6130},
organization = {The Internet Engineering Task Force},
abstract = {This document describes a 1-hop and symmetric 2-hop neighborhood discovery protocol (NHDP) for mobile ad hoc networks (MANETs).},
note = {http://tools.ietf.org/html/rfc6130},
keywords = {Ad-Hoc, IETF, MANET, MESH, NHDP, OLSR, OLSRv2, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Juan Antonio Cordero; Thomas Clausen; Emmanuel Baccelli
MPR+SP: Towards a Unified MPR-based MANET Extension for OSPF Proceedings Article
In: Hawaii International Conference on System Sciences, 2011.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, MPR, OSPF
@inproceedings{Fuertes2011,
title = {MPR+SP: Towards a Unified MPR-based MANET Extension for OSPF},
author = {Juan Antonio Cordero and Thomas Clausen and Emmanuel Baccelli},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2011-HICSS-MPRSP-Towards-a-Unified-MPR-based-MANET-Extension-for-OSPF.pdf},
doi = {10.1109/HICSS.2011.313},
year = {2011},
date = {2011-01-01},
publisher = {Hawaii International Conference on System Sciences},
abstract = {Heterogeneous networks combining both wired and wireless components – fixed routers as well as mobile routers – emerge as wireless mesh networks are being deployed. Such heterogeneity is bound to become more and more present in the near future as mobile ad hoc networking becomes a reality. While it is possible to cope with heterogeneity by employing different routing protocols for the fixed / wired part and for the wireless / ad hoc part of the network, this may lead to sub-optimal performance, e.g. by way of longer routing paths due to these routing protocols sharing prefixes and ”connecting” the network only at distinct gateways between the two routing domains. Thus, the establishment of a single unified routing domain, and the use of a single routing protocol, for such heterogeneous networks is desired. OSPF is a natural candidate for this task, due to its wide deployment, its modularity and its similarity with the popular ad hoc routing protocol OLSR. Multiple OSPF extensions for MANETs have therefore been specified by the IETF. This paper introduces a novel OSPF extension for operation on ad hoc networks, MPRSP, and compares it with the existing OSPF extensions via simulations, which show that MPR+SP outperforms prior art.},
keywords = {Ad-Hoc, MANET, MESH, MPR, OSPF},
pubstate = {published},
tppubtype = {inproceedings}
}
2010
Ulrich Herberg; Thomas Clausen
Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks Proceedings Article
In: Proceedings of the 6th International Conference on Mobile Ad-hoc and Sensor Networks (MSN'10), 2010.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Autoconfiguration, MANET, MESH
@inproceedings{Clausen2010g,
title = {Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks},
author = {Ulrich Herberg and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-MSN-Yet-Another-Autoconf-Proposal.pdf},
doi = {10.1109/MSN.2010.48},
year = {2010},
date = {2010-12-01},
publisher = {Proceedings of the 6th International Conference on Mobile Ad-hoc and Sensor Networks (MSN'10)},
abstract = {This paper addresses the issues of automatic address and prefix configuration of MANET routers. Specifically, the paper analyzes the differences between “classic IP networks” and MANETs, emphasizing the interface, link, topology, and addressing assumptions present in “classic IP networks”. The paper presents a model for how this can be matched to the specific constraints and conditions of a MANET – i.e., how MANETs can be configured to adhere to the Internet addressing architecture. This sets the stage for development of a MANET autoconfiguration protocol, enabling automatic configuration of MANET interfaces and prefix delegation. This autoconfiguration protocol is characterized by (i) adhering strictly to the Internet addressing architecture, (ii) being able to configure both MANET interface addresses and handle prefix delegation, and (iii) being able to configure both stand-alone MANETs, as well as MANETs connected to an infrastructure providing, e.g., globally scoped addresses/prefixes for use within the MANET. The protocol is specified through timed automatons which, by way of model checking, enable verification of certain protocol properties. Fur-thermore, a performance study of the basic protocol, as well as an optimization hereto, is conducted based on network simulations.},
keywords = {Ad-Hoc, Autoconfiguration, MANET, MESH},
pubstate = {published},
tppubtype = {inproceedings}
}
Ulrich Herberg; Thomas Clausen; Robert G. Cole
MANET Network Management and Performance Monitoring for NHDP and OLSRv2 Proceedings Article
In: Proceedings of the 6th International Conference on Network and Services Management, 2010.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, Network Management, Network Monitoring, OLSR, OLSRv2
@inproceedings{Herberg2010,
title = {MANET Network Management and Performance Monitoring for NHDP and OLSRv2},
author = {Ulrich Herberg and Thomas Clausen and Robert G. Cole},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-CNSM-MANET-Network-Management-and-Performance-Monitoring-for-NHDP-and-OLSRv2.pdf},
doi = {10.1109/CNSM.2010.5691209},
year = {2010},
date = {2010-10-01},
publisher = {Proceedings of the 6th International Conference on Network and Services Management},
abstract = {Mobile Ad Hoc NETworks (MANETs) are gener-ally thought of as infrastructureless and largely “un-managed” network deployments, capable of accommodating highly dynamic network topologies. Yet, while the network infrastructure may be “un-managed”, monitoring the network performance and setting configuration parameters once deployed, remains important in order to ensure proper “tuning” and maintenance of a MANET. This paper describes a management framework for the MANET routing protocol OLSRv2, and its constituent protocol NHDP. It does so by presenting considerations for “what to monitor and manage” in an OLSRv2 network, and how. The approach developed is based on the Simple Network Management Protocol (SNMP), and thus this paper details the various Management Information Bases (MIBs) for router status monitoring and control – as well as a novel approach to history-based perfor-mance monitoring. While SNMP may not be optimally designed for MANETs, it is chosen due to it being the predominant protocol for IP network management – and thus, efforts are made in this paper to “adapt” the management tools within the SNMP framework for reasonable behavior also in a MANET environment.},
keywords = {Ad-Hoc, MANET, MESH, Network Management, Network Monitoring, OLSR, OLSRv2},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Ulrich Herberg
Router and Link Admittance Control in the Optimized Link State Routing Protocol version 2 (OLSRv2) Proceedings Article
In: Proceedings of the 4th International Conference on Network and System Security (NSS 2010), 2010, ISBN: 978-1-4244-8484-3.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2, Security
@inproceedings{Clausen2010i,
title = {Router and Link Admittance Control in the Optimized Link State Routing Protocol version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-NSS-Router-and-Link-Admittance-Control-in-the-Optimized-Link-State-Routing-Protocol-version-2-OLSRv2.pdf},
doi = {10.1109/NSS.2010.20},
isbn = {978-1-4244-8484-3},
year = {2010},
date = {2010-09-01},
publisher = {Proceedings of the 4th International Conference on Network and System Security (NSS 2010)},
abstract = {This paper presents security mechanisms for router and link admittance control in OLSRv2. Digitally signing OLSRv2 control messages allows recipient routers to – individually – choose to admit or exclude the originating router for when populating link-state databases, calculating MPR sets etc. By additionally embedding signatures for each advertised link, recipient routers can also control admittance of each advertised link in the message, rendering an OLSRv2 network resilient to both identity-spoofing and link-spoofing attacks. The flip-side of the coin when using such a link-admittance mechanism is, that the number of signatures to include in each OLSRv2 control message is a function of the number of links advertised. For HELLO messages, this is essentially the number of neighbor routers, for TC messages, this is the number of MPR Selectors of the originator of the message. Also, upon receipt of a control message, these signatures are to be verified. This paper studies the impact of adding a link-admittance control mechanism to OLSRv2, both in terms of additional control-traffic overhead and additional in-router processing resources, using several cryptographic algorithms, such as RSA and Elliptic Curve Cryptography for very short signatures. Index Terms—OLSRv2, MANET, security, router, link admit-tance control, digital signatures},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Ulrich Herberg
Study of Multipoint-to-Point and Broadcast Traffic Performance in RPL Technical Report
2010.
BibTeX | Tags: Ad-Hoc, Broadcast, Constrained Networks, LLN, MANET, MESH, Multicast, Performance Evaluation, RPL, Sensor Networks
@techreport{Clausen2010bb,
title = {Study of Multipoint-to-Point and Broadcast Traffic Performance in RPL},
author = {Thomas Clausen and Ulrich Herberg},
year = {2010},
date = {2010-09-01},
publisher = {INRIA Research Report RR-7384},
keywords = {Ad-Hoc, Broadcast, Constrained Networks, LLN, MANET, MESH, Multicast, Performance Evaluation, RPL, Sensor Networks},
pubstate = {published},
tppubtype = {techreport}
}
Ulrich Herberg; Thomas Clausen; Jerome Milan
Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol version 2 Proceedings Article
In: Proceedings of the International Conference on Internet Technology and Applications (iTAP 2010), 2010, ISBN: 978-1-4244-5142-5.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2
@inproceedings{Clausen2010j,
title = {Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol version 2},
author = {Ulrich Herberg and Thomas Clausen and Jerome Milan},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-ITAP-Digital-Signatures-for-Admittance-Control-in-OLSRv2.pdf},
doi = {10.1109/ITAPP.2010.5566285},
isbn = {978-1-4244-5142-5},
year = {2010},
date = {2010-08-01},
publisher = {Proceedings of the International Conference on Internet Technology and Applications (iTAP 2010)},
abstract = {Public community Mobile Ad Hoc NETworks (MANETs), such as the “Funkfeuer” or “Freifunk” networks, scale up to several hundreds of routers, connecting users with each other, and with the Internet. As MANETs are typically operated over wireless channels (e.g. WiFi), access to these networks is granted to anyone in the radio range of another router in the MANET, and running the same MANET routing protocol. In order to protect the stability of the networks from malicious intruders, it is important to ensure that only trusted peers are admitted to participate in the control message exchange, and to provide means for logically “disconnecting” a non-trustworthy peer. This paper presents the concept of admittance control for the Optimized Link State Routing Protocol version 2 (OLSRv2), and suggests a security extension based on digital signatures. Due to the flexible message format of OLSRv2, this extension keeps compatibility with the core OLSRv2 specification. Several standard digital signature algorithms (RSA, DSA, ECDSA), as well as HMAC, are compared in terms of message overhead and CPU time for generating and processing signatures.},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Ulrich Herberg
Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks Technical Report
2010.
BibTeX | Tags: Ad-Hoc, Autoconfiguration, MANET, MESH
@techreport{Clausen2010bb,
title = {Yet Another Autoconf Proposal (YAAP) for Mobile Ad hoc NETworks},
author = {Thomas Clausen and Ulrich Herberg},
year = {2010},
date = {2010-07-01},
publisher = {INRIA Research Report 7341},
keywords = {Ad-Hoc, Autoconfiguration, MANET, MESH},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen; Ulrich Herberg
MANET Network Management and Performance Monitoring for NHDP and OLSRv2 Technical Report
2010.
BibTeX | Tags: Ad-Hoc, MANET, MESH, Network Management, Network Monitoring, NHDP, OLSR, OLSRv2
@techreport{Clausen2010bb,
title = {MANET Network Management and Performance Monitoring for NHDP and OLSRv2},
author = {Thomas Clausen and Ulrich Herberg},
year = {2010},
date = {2010-06-01},
publisher = {INRIA Research Report 7311},
keywords = {Ad-Hoc, MANET, MESH, Network Management, Network Monitoring, NHDP, OLSR, OLSRv2},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen; Ulrich Herberg
Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2) Proceedings Article
In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010), 2010, ISBN: 978-1-4244-5850-9.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2, Security
@inproceedings{Clausen2010k,
title = {Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-WCNIS-Vulnerability-Analysis-of-the-Optimized-Link-State-Routing-Protocol-version-2-OLSRv2.pdf},
doi = {10.1109/WCINS.2010.5544732},
isbn = {978-1-4244-5850-9},
year = {2010},
date = {2010-06-01},
publisher = {Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010)},
abstract = {Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deploy-ments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of “trusted participants”, the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks – in a certain way, provides a “cookbook” for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2, Security},
pubstate = {published},
tppubtype = {inproceedings}
}
Ulrich Herberg; Thomas Clausen
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) Journal Article
In: International Journal of Network Security & Its Applications (IJNSA), 2010.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2
@article{LIX-NET-journal-70,
title = {Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)},
author = {Ulrich Herberg and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2010-IJNSA-Security-Issues-in-the-Optimized-Link-State-Routing-Protocol-version-2-OLSRv2-1.pdf},
year = {2010},
date = {2010-04-01},
journal = {International Journal of Network Security & Its Applications (IJNSA)},
abstract = {Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community- networks are emerging, connecting regular Internet users with each other, and with the Internet, via MANETs. Growing to encompass more than a handful of “trusted participants”, the question of preserving the MANET network connectivity, even when faced with careless or malicious participants, arises, and must be addressed.
A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use.
This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks – in a certain way, provides a “cookbook” for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2},
pubstate = {published},
tppubtype = {article}
}
A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol, managing the connectivity. By understanding how the algorithms of the routing protocol operate, and how these can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use.
This paper takes an abstract look at the algorithms that constitute the Optimized Link State Routing Protocol version 2 (OLSRv2), and identifies for each protocol element the possible vulnerabilities and attacks – in a certain way, provides a “cookbook” for how to best attack an operational OLSRv2 network, or for how to proceed with developing protective countermeasures against these attacks.
Thomas Clausen; Ulrich Herberg
Router and Link Admittance Control in the Optimized Link State Routing Protocol version 2 (OLSRv2) Technical Report
2010.
BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2
@techreport{Clausen2010bb,
title = {Router and Link Admittance Control in the Optimized Link State Routing Protocol version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg},
year = {2010},
date = {2010-04-01},
publisher = {INRIA Research Report 7248},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen; Ulrich Herberg
Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2) Technical Report
2010.
BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2
@techreport{Clausen2010bb,
title = {Vulnerability Analysis of the Optimized Link State Routing Protocol version 2 (OLSRv2)},
author = {Thomas Clausen and Ulrich Herberg},
year = {2010},
date = {2010-02-01},
publisher = {INRIA Research Report 7203},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen; Ulrich Herberg; Jerome Milan
Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol version 2 Technical Report
2010.
BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2
@techreport{Clausen2010bb,
title = {Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol version 2},
author = {Thomas Clausen and Ulrich Herberg and Jerome Milan},
year = {2010},
date = {2010-02-01},
publisher = {INRIA Research Report 7216},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen; Ulrich Herberg
Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2)) Technical Report
2010.
BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2
@techreport{Clausen2010bb,
title = {Security Issues in the Optimized Link State Routing Protocol version 2 (OLSRv2))},
author = {Thomas Clausen and Ulrich Herberg},
year = {2010},
date = {2010-02-01},
publisher = {INRIA Research Report 7218},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security, OLSRv2},
pubstate = {published},
tppubtype = {techreport}
}
Ulrich Herberg; Nestor Mariyasagayam; Thomas Clausen
Comparison of NHDP and MHVB for Neighbor Discovery in Multi-hop Ad Hoc Networks Technical Report
2010.
BibTeX | Tags: Ad-Hoc, MANET, MESH, NHDP, Performance Evaluation
@techreport{LIX-NET-RR-25,
title = {Comparison of NHDP and MHVB for Neighbor Discovery in Multi-hop Ad Hoc Networks},
author = {Ulrich Herberg and Nestor Mariyasagayam and Thomas Clausen},
year = {2010},
date = {2010-01-01},
publisher = {INRIA Research Report RR-7173},
keywords = {Ad-Hoc, MANET, MESH, NHDP, Performance Evaluation},
pubstate = {published},
tppubtype = {techreport}
}
2009
Emmanuel Baccelli; Thomas Clausen; Ulrich Herberg; Charles E. Perkins
IP Links in Multihop Ad Hoc Wireless Networks? Proceedings Article
In: Proceedings of SoftCom, 2009.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Cross-Layer Design
@inproceedings{Clausen2009,
title = {IP Links in Multihop Ad Hoc Wireless Networks?},
author = {Emmanuel Baccelli and Thomas Clausen and Ulrich Herberg and Charles E. Perkins},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2009-SOFTCOM-IP-Links-in-Multihop-Ad-Hoc-Wireless-Networks.pdf},
year = {2009},
date = {2009-09-01},
publisher = {Proceedings of SoftCom},
abstract = {A number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet. However, there is another independent and important issue, namely, how can existing Internet networks and ad hoc networks co- exist coherently within the same protocol architecture. A fundamental concept in the IP protocol suite is that of a link. The link concept has so far been key to the scalability of IP networking. This paper identifies and discusses issues regarding the formalisation of a similar concept in the multi- hop ad hoc networking context – one of the first steps that must be taken in the near future, in order to be able to accomodate ad hoc networks in the Internet.
},
keywords = {Ad-Hoc, Cross-Layer Design},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Christopher Dearlove
RFC5497: Representing Multi-Value Time in MANETs Miscellaneous
2009, (http://www.rfc-editor.org/rfc/rfc5497.txt).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, RFC, Standard
@misc{Clausen2009,
title = {RFC5497: Representing Multi-Value Time in MANETs},
author = {Thomas Clausen and Christopher Dearlove},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc5497.txt.pdf},
doi = {10.17487/RFC5497},
year = {2009},
date = {2009-03-01},
publisher = {IETF - Std. Track RFC},
organization = {The Internet Engineering Task Force},
abstract = {This document describes a general and flexible TLV (type-length-value structure) for representing time-values, such as an interval or a duration, using the generalized Mobile Ad hoc NETwork (MANET) packet/ message format. It defines two Message TLVs and two Address Block TLVs for representing validity and interval times for MANET routing protocols.},
note = {http://www.rfc-editor.org/rfc/rfc5497.txt},
keywords = {Ad-Hoc, IETF, MANET, MESH, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Thomas Clausen; Christopher Dearlove; Justin Dean; Cedric Adjih
RFC5444 - Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format Miscellaneous
2009, (http://www.ietf.org/rfc/rfc5444.txt).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, RFC, Standard
@misc{Clausen2009,
title = {RFC5444 - Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format},
author = {Thomas Clausen and Christopher Dearlove and Justin Dean and Cedric Adjih},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc5444.txt.pdf},
doi = {10.17487/RFC5444},
year = {2009},
date = {2009-02-01},
publisher = {IETF - Std. Track RFC},
organization = {The Internet Engineering Task Force},
abstract = {This document specifies a packet format capable of carrying multiple messages that may be used by mobile ad hoc network routing protocols.},
note = {http://www.ietf.org/rfc/rfc5444.txt},
keywords = {Ad-Hoc, IETF, MANET, MESH, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Emmanuel Baccelli; Thomas Clausen; Philippe Jacquet; Dang Nguyen
RFC5449 - OSPF Multipoint Relay (MPR) Extension for Ad Hoc Networks Miscellaneous
2009, (http://tools.ietf.org/html/rfc5449).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OSPF, RFC, Standard
@misc{Baccelli2009,
title = {RFC5449 - OSPF Multipoint Relay (MPR) Extension for Ad Hoc Networks},
author = {Emmanuel Baccelli and Thomas Clausen and Philippe Jacquet and Dang Nguyen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc5449.txt.pdf},
doi = {10.17487/RFC5449},
year = {2009},
date = {2009-02-01},
publisher = {IETF - Exp. RFC},
organization = {The Internet Engineering Task Force},
abstract = {This document specifies an OSPFv3 interface type tailored for mobile ad hoc networks. This interface type is derived from the broadcast interface type, and is denoted the "OSPFv3 MANET interface type". This memo defines an Experimental Protocol for the Internet community.},
note = {http://tools.ietf.org/html/rfc5449},
keywords = {Ad-Hoc, IETF, MANET, MESH, OSPF, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Thomas Clausen
MANET Router Configuration Recommendations Technical Report
2009.
BibTeX | Tags: Ad-Hoc, MANET, MESH
@techreport{Clausen2009b,
title = {MANET Router Configuration Recommendations},
author = {Thomas Clausen},
year = {2009},
date = {2009-02-01},
publisher = {Inria Research Report RR-6852},
keywords = {Ad-Hoc, MANET, MESH},
pubstate = {published},
tppubtype = {techreport}
}
2008
Thomas Clausen; Christopher Dearlove; Brian Adamson
RFC5148: Jitter Considerations in Mobile Ad Hoc Networks (MANETs) Miscellaneous
2008, (http://tools.ietf.org/html/rfc5148).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, RFC, Standard
@misc{Clausen2008,
title = {RFC5148: Jitter Considerations in Mobile Ad Hoc Networks (MANETs)},
author = {Thomas Clausen and Christopher Dearlove and Brian Adamson},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc5148.txt.pdf},
doi = {10.17487/RFC5148},
year = {2008},
date = {2008-02-01},
publisher = {RFC},
organization = {The Internet Engineering Task Force},
abstract = {This document provides recommendations for jittering (randomly modifying timing) of control traffic transmissions in Mobile Ad hoc NETwork (MANET) routing protocols to reduce the probability of transmission collisions,},
note = {http://tools.ietf.org/html/rfc5148},
keywords = {Ad-Hoc, IETF, MANET, MESH, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
2007
Thomas Clausen
A MANET Architectural Model Technical Report
2007.
BibTeX | Tags: Ad-Hoc, MANET, MESH
@techreport{LIX-NET-RR-3,
title = {A MANET Architectural Model},
author = {Thomas Clausen},
year = {2007},
date = {2007-01-01},
publisher = {INRIA Research Report RR-6145},
keywords = {Ad-Hoc, MANET, MESH},
pubstate = {published},
tppubtype = {techreport}
}
2005
Emmanuel Baccelli; Thomas Clausen; Julien Garnier
Duplicate Address Detection in OLSR Networks Proceedings Article
In: IEEE Conference on Wireless Personal Multimedia Communications (WPMC), Aalborg, Denmark, Sept. 2005, 2005.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Autoconfiguration, MANET, MESH, OLSR
@inproceedings{Clausen2005,
title = {Duplicate Address Detection in OLSR Networks},
author = {Emmanuel Baccelli and Thomas Clausen and Julien Garnier},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2005-WPMC-Duplicate-Address-Detection-in-OLSR-Networks.pdf},
year = {2005},
date = {2005-09-01},
publisher = {IEEE Conference on Wireless Personal Multimedia Communications (WPMC), Aalborg, Denmark, Sept. 2005},
abstract = {Commonly, duplicate address detection is performed when configuring network interfaces in order to ensure that unique addresses are assigned to each interface in the network. Such mechanisms commonly operate with the premises that a node ”intelligently” selects an address which it supposes to be unique, followed by a duplicate ad- dress detection cycle, through which it verifies that no other active interfaces on the same network has been or is in the process of being configured with the same address. Even as- suming that such a mechanism is present in a MANET, al- lowing MANET nodes to initially configure their interfaces with addresses unique within the network, additional com- plications arise: two or more MANETs may merge to form a single network, and a formerly connected MANET may partition. Thus, unless it is ensured that all MANET in- terfaces are assigned globally unique addresses, addressing conflicts may at any point – not just during initial network configuration.
In this paper, we investigate the task of performing dupli- cate address detection when otherwise independent OLSR networks merge. We benefit from the information already exchanged by OLSR, and identify a number of mechanisms through which a node may detect a conflict between the ad- dress assigned to one of its interfaces, and an address as- signed to an interface on another node. The mechanisms proposed are, thus, entirely passive, creating no additional information exchange on the network.},
keywords = {Ad-Hoc, Autoconfiguration, MANET, MESH, OLSR},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we investigate the task of performing dupli- cate address detection when otherwise independent OLSR networks merge. We benefit from the information already exchanged by OLSR, and identify a number of mechanisms through which a node may detect a conflict between the ad- dress assigned to one of its interfaces, and an address as- signed to an interface on another node. The mechanisms proposed are, thus, entirely passive, creating no additional information exchange on the network.
Thomas Clausen; Cedric Adjih; Emmanuel Baccelli; Philippe Jacquet
On the robustness and stability of Connected Dominating Sets Technical Report
2005.
Abstract | Links | BibTeX | Tags: Ad-Hoc, CDS, MANET, MPR
@techreport{LIX-NET-RR-5,
title = {On the robustness and stability of Connected Dominating Sets},
author = {Thomas Clausen and Cedric Adjih and Emmanuel Baccelli and Philippe Jacquet},
url = {https://www.thomasclausen.net/wp-content/uploads/2022/05/RR-5609.pdf},
year = {2005},
date = {2005-06-01},
urldate = {2005-06-01},
publisher = {INRIA Research Report RR-5609},
abstract = {We investigate in this paper the effect of mobility, collisions and obsolete informations on the performance of connected dominating set (CDS). In particular we show that neighbor-designated CDS such as multipoint relay (MPR) are in general more robust than self-selected CDS such as rule 𝑘 CDS. This is particularly crucial in application such as wireless OSPF where third party topology informations may take arbitrary delay.},
keywords = {Ad-Hoc, CDS, MANET, MPR},
pubstate = {published},
tppubtype = {techreport}
}
Emmanuel Baccelli; Thomas Clausen
A Simple Address Autoconfiguration Mechanism for OLSR Proceedings Article
In: IEEE International Symposium on Circuits and Systems (ISCAS), Kobe, Japan, May 2005, 2005.
Abstract | Links | BibTeX | Tags: Ad-Hoc, Autoconfiguration, MANET, MESH, OLSR
@inproceedings{Clausen2005b,
title = {A Simple Address Autoconfiguration Mechanism for OLSR},
author = {Emmanuel Baccelli and Thomas Clausen},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2005-ISCAS-A-Simple-Address-Autoconfiguration-Mechanism-for-OLSR.pdf},
doi = {10.1109/ISCAS.2005.1465251},
year = {2005},
date = {2005-05-01},
publisher = {IEEE International Symposium on Circuits and Systems (ISCAS), Kobe, Japan, May 2005},
abstract = {In this paper, we develop a simple autoconfiguration mechanism for OLSR networks. The mechanism aims at solving the simple, but common, probem of one or more new nodes emerging in an ex- isting network. We propose a simple solution, which allows these new nodes to acquire an address and participate in the network. Our method is simple, both algorithmically and in the require- ments to the network. While we recognize that this is a partial so- lution to the general autoconfiguration problem, we argue that the mechanism described in this paper will satisfy the requirements from a great number of real-world situations.},
keywords = {Ad-Hoc, Autoconfiguration, MANET, MESH, OLSR},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Anis Laouiti; Paul Muhlethaler; Daniel Raffo; Cedric Adjih
Securing the OLSR routing protocol with or without compromised nodes in the network Technical Report
2005.
Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR, OLSR Security
@techreport{LIX-NET-RR-6,
title = {Securing the OLSR routing protocol with or without compromised nodes in the network},
author = {Thomas Clausen and Anis Laouiti and Paul Muhlethaler and Daniel Raffo and Cedric Adjih},
url = {http://www.thomasclausen.net/wp-content/uploads/2018/05/RR-5494.pdf},
year = {2005},
date = {2005-02-01},
publisher = {INRIA Research Report RR-5621},
keywords = {Ad-Hoc, MANET, MESH, OLSR, OLSR Security},
pubstate = {published},
tppubtype = {techreport}
}
2004
Thomas Clausen; Emmanuel Baccelli; Georgios Rodolakis; Cedric Adjih; Philippe Jacquet
Fish-Eye OLSR Scaling Properties Journal Article
In: IEEE Journal on Communications Networks (JCN), Special Issue on Ad Hoc Networking, Dec 2004, 2004.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH
@article{LIX-NET-journal-2,
title = {Fish-Eye OLSR Scaling Properties},
author = {Thomas Clausen and Emmanuel Baccelli and Georgios Rodolakis and Cedric Adjih and Philippe Jacquet},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2004-JCN-Fish-Eye-OLSR-Scaling-Properties.pdf},
year = {2004},
date = {2004-12-01},
journal = {IEEE Journal on Communications Networks (JCN), Special Issue on Ad Hoc Networking, Dec 2004},
abstract = {Scalability is one of the toughest challenges in ad hoc networking. Recent work outlines theoretical bounds on how well routing protocols could scale in this environment. However, none of the popular routing solutions really scales to large networks, by coming close enough to these bounds. In this paper, we study the case of link state routing and OLSR, one of the strongest candidate for standardization. We analyze how these bounds are not reached in this case, and we study how much the scalability is enhanced with the use of Fish Eye techniques in addition to the link state routing framework. We show that with this enhancement, the theoretical scalability bounds are reached.},
keywords = {Ad-Hoc, MANET, MESH},
pubstate = {published},
tppubtype = {article}
}
Emmanuel Baccelli; Thomas Clausen; Philippe Jacquet
OSPF-style Database Exchange and Reliable Synchronization in the Optimized Link State Routing Protocol Proceedings Article
In: IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), San Jose, USA, Oct. 2004, 2004.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OSPF
@inproceedings{Clausen2004b,
title = {OSPF-style Database Exchange and Reliable Synchronization in the Optimized Link State Routing Protocol},
author = {Emmanuel Baccelli and Thomas Clausen and Philippe Jacquet},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2004-IEEE-SECON-OSPF-style-Database-Exchange-and-Reliable-Synchronization-in-the-Optimized-Link-State-Routing-Protocol.pdf},
doi = {10.1109/SAHCN.2004.1381921},
year = {2004},
date = {2004-10-01},
publisher = {IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), San Jose, USA, Oct. 2004},
abstract = {The Optimized Link-State Routing protocol (OLSR) is a proactive link-state routing protocol. While similar to the well-known Internet routing protocol OSPF, OLSR is designed to be simple, and to maintain connec- tivity in face of highly dense and dynamic networks, while being ressource-economic (battery, bandwidth etc.) These characteristics make OLSR suitable as an underlaying routing protocol in a wide range of ad-hoc sensor networks.
In this paper, we introduce an extension to OLSR: OSPF-style database exchange and reliable synchroniza- tion. The goal of this extension is to provide a mechanism, through which nodes in an ad-hoc sensor network can de- tect and correct discrepancies in their link-state databases. We qualify why the mechanism, found in OSPF, is not directly applicable for ad-hoc sensor networks, describe an adopted mechanism, accomplishing the same goal, and evaluate the performance of this mechanism in comparison to the database exchange mechanism found in OSPF. We finally discuss some applications of database exchange and reliable synchronization in ad-hoc sensor networks.},
keywords = {Ad-Hoc, MANET, MESH, OSPF},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we introduce an extension to OLSR: OSPF-style database exchange and reliable synchroniza- tion. The goal of this extension is to provide a mechanism, through which nodes in an ad-hoc sensor network can de- tect and correct discrepancies in their link-state databases. We qualify why the mechanism, found in OSPF, is not directly applicable for ad-hoc sensor networks, describe an adopted mechanism, accomplishing the same goal, and evaluate the performance of this mechanism in comparison to the database exchange mechanism found in OSPF. We finally discuss some applications of database exchange and reliable synchronization in ad-hoc sensor networks.
Emmanuel Baccelli; Thomas Clausen; Philippe Jacquet
Ad-hoc and Internet Convergence: Adapting OSPF-style Database Exchanges for Ad-hoc Networks, Proceedings Article
In: Proceedings of the Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs), London, UK., Proceedings of the Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs), London, UK., 2004.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OSPF
@inproceedings{Clausen2004,
title = {Ad-hoc and Internet Convergence: Adapting OSPF-style Database Exchanges for Ad-hoc Networks,},
author = {Emmanuel Baccelli and Thomas Clausen and Philippe Jacquet},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2004-HetNets-Ad-hoc-and-Internet-Convergence-Adapting-OSPF-style-Database-Exchanges-for-Ad-hoc-Networks.pdf},
year = {2004},
date = {2004-10-01},
booktitle = {Proceedings of the Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs), London, UK.},
publisher = {Proceedings of the Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs), London, UK.},
abstract = {The OSPF routing protocol is, currently, the predominant IGP in use on the fixed Internet of today. This routing protocol scales (in principle) ”world wide”, under the assumptions of links being relatively stable, network density being low (relatively few adjacencies per router) and mobility being present at the edges of the networks only. Recently, work has begun towards extending the domain of OSPF to also include ad-hoc networks – i.e. dense networks, in which links are short-lived and all nodes are mobile.
In this paper, we focus on the convergence of the Internet and ad-hoc networks, through extensions to the OSPF routing protocol. Based on WOSPF, a merger of the ad- hoc routing protocol OLSR and OSPF, we examine the feature of OSPF database exchange and reliable synchro- nisation in the context of ad-hoc networking. We find that the mechanisms, in the form present in OSPF, are not suitable for the ad-hoc domain. We propose an alternative mechanism for link-state database exchanges in wireless ad-hoc networks, aiming at furthering an adaptation of OSPF to be useful also on ad-hoc networks, and evaluate our alternative against the mechanism found in OSPF.
Our proposed mechanism is specified with the following applications in mind: (i) Reliable diffusion of link-state information replacing OSPF acknowledgements with a mechanism suitable for mobile wireless networks; (ii) Reduced overhead for performing OSPF style database exchanges in a mobile wireless network; (iii) Reduced initialisation time when new nodes are emerging in the network; (iv) Reduced overhead and reduced convergence time when several wireless OSPF ad hoc network clouds merge.},
keywords = {Ad-Hoc, MANET, MESH, OSPF},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we focus on the convergence of the Internet and ad-hoc networks, through extensions to the OSPF routing protocol. Based on WOSPF, a merger of the ad- hoc routing protocol OLSR and OSPF, we examine the feature of OSPF database exchange and reliable synchro- nisation in the context of ad-hoc networking. We find that the mechanisms, in the form present in OSPF, are not suitable for the ad-hoc domain. We propose an alternative mechanism for link-state database exchanges in wireless ad-hoc networks, aiming at furthering an adaptation of OSPF to be useful also on ad-hoc networks, and evaluate our alternative against the mechanism found in OSPF.
Our proposed mechanism is specified with the following applications in mind: (i) Reliable diffusion of link-state information replacing OSPF acknowledgements with a mechanism suitable for mobile wireless networks; (ii) Reduced overhead for performing OSPF style database exchanges in a mobile wireless network; (iii) Reduced initialisation time when new nodes are emerging in the network; (iv) Reduced overhead and reduced convergence time when several wireless OSPF ad hoc network clouds merge.
Thomas Clausen; Philippe Jacquet; Laurent Viennot
Analyzing Control Traffic Overhead versus Mobility and Data Traffic Activity in Mobile Ad Hoc Network Protocols Journal Article
In: ACM Journal on Wireless Networks (Winet) July 2004, volume 10 no. 4, 2004.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH
@article{Clausen2004,
title = {Analyzing Control Traffic Overhead versus Mobility and Data Traffic Activity in Mobile Ad Hoc Network Protocols},
author = {Thomas Clausen and Philippe Jacquet and Laurent Viennot},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/2004-ACM-WINET-Analyzing-Control-Traffic-Overhead-versus-Mobility-and-Data-Traffic-Activity-in-Mobile-Ad-hoc-Network-Protoc.pdf},
year = {2004},
date = {2004-07-01},
journal = {ACM Journal on Wireless Networks (Winet) July 2004, volume 10 no. 4},
abstract = {This paper proposes a general, parameterized model for analyzing protocol control overhead in mobile ad-hoc networks. A probabilistic model for the network topology and the data traffic is proposed in order to estimate overhead due to control packets of routing protocols. Our analytical model is validated by comparisons with simulations, both taken from literature and made specifically for this paper. For example, our model predicts linearity of control overhead with regard to mobility as observed in existing simulations results. We identify the model parameters for protocols like AODV, DSR and OLSR. Our model then allows accurate predictions of which protocol will yield the lowest overhead depending on the node mobility and traffic activity pattern.},
keywords = {Ad-Hoc, MANET, MESH},
pubstate = {published},
tppubtype = {article}
}
Thomas Clausen; Philippe Jacquet; Emmanuel Baccelli
OSPF-style Database Exchange and Reliable Synchronization in the OLSR Technical Report
2004.
BibTeX | Tags: Ad-Hoc, MANET, MESH
@techreport{Clausen2004b,
title = {OSPF-style Database Exchange and Reliable Synchronization in the OLSR},
author = {Thomas Clausen and Philippe Jacquet and Emmanuel Baccelli},
year = {2004},
date = {2004-06-01},
publisher = {INRIA Research Report RR-5283},
keywords = {Ad-Hoc, MANET, MESH},
pubstate = {published},
tppubtype = {techreport}
}
Thomas Clausen
Comparative Study of Routing Protocols for Mobile Ad-hoc networks Proceedings Article
In: INRIA Research Report RR-5135, 2004.
BibTeX | Tags: Ad-Hoc, MANET, MESH, OLSR
@inproceedings{Clausen2004bb,
title = {Comparative Study of Routing Protocols for Mobile Ad-hoc networks},
author = {Thomas Clausen},
year = {2004},
date = {2004-03-01},
publisher = {INRIA Research Report RR-5135},
keywords = {Ad-Hoc, MANET, MESH, OLSR},
pubstate = {published},
tppubtype = {inproceedings}
}
Thomas Clausen; Emmanuel Baccelli; Philippe Jacquet
Signature and Database Exchange for Wireless OSPF Interfaces Technical Report
2004.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, OSPF
@techreport{Clausen2004bb,
title = {Signature and Database Exchange for Wireless OSPF Interfaces},
author = {Thomas Clausen and Emmanuel Baccelli and Philippe Jacquet},
url = {https://www.thomasclausen.net/wp-content/uploads/2022/05/RR-5096.pdf},
year = {2004},
date = {2004-01-01},
urldate = {2004-01-01},
publisher = {INRIA Research Report RR-5096},
abstract = {In this paper, we specify a mechanism for link-state database exchanges in wire- less ad-hoc networks. The mechanism is taylored for ad-hoc networks employing the wireless OSPF interface extension specification, however is suitable for any proactive link-state routing protocol. The database exchange mechanism is specified with the following applications in mind:
(I) reliable diffusion of link-state information, replacing OSPF acknowledgements with a mechanism, suitable for mobile wireless networks;
(II) reduced overhead for performing OSPF style database exchanges in a mobile wireless network;
(III) reduced initialization time when new node(s) are emerging in the network;
(IV) reduced overhead and reduced convergence time when two (or more) WOSPF adhoc network clouds merge},
keywords = {Ad-Hoc, MANET, MESH, OSPF},
pubstate = {published},
tppubtype = {techreport}
}
(I) reliable diffusion of link-state information, replacing OSPF acknowledgements with a mechanism, suitable for mobile wireless networks;
(II) reduced overhead for performing OSPF style database exchanges in a mobile wireless network;
(III) reduced initialization time when new node(s) are emerging in the network;
(IV) reduced overhead and reduced convergence time when two (or more) WOSPF adhoc network clouds merge
2003
Thomas Clausen; Philippe Jacquet
RFC3626: The Optimized Link State Routing Protocol Miscellaneous
2003, (http://tools.ietf.org/html/rfc3626).
Abstract | Links | BibTeX | Tags: Ad-Hoc, IETF, MANET, MESH, OLSR, RFC, Standard
@misc{Clausen2003,
title = {RFC3626: The Optimized Link State Routing Protocol},
author = {Thomas Clausen and Philippe Jacquet},
url = {http://www.thomasclausen.net/wp-content/uploads/2015/12/rfc3626.txt.pdf},
doi = {10.17487/RFC3626},
year = {2003},
date = {2003-10-01},
publisher = {The Internet Engineering Task Force (IETF) - MANET Working Group},
organization = {The Internet Engineering Task Force},
abstract = {This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN. The key concept used in the protocol is that of multipoint relays (MPRs). MPRs are selected nodes which forward broadcast messages during the flooding process. This technique substantially reduces the message overhead as compared to a classical flooding mechanism, where every node retransmits each message when it receives the first copy of the message. In OLSR, link state information is generated only by nodes elected as MPRs. Thus, a second optimization is achieved by minimizing the number of control messages flooded in the network. As a third optimization, an MPR node may chose to report only links between itself and its MPR selectors. Hence, as contrary to the classic link state algorithm, partial link state information is distributed in the network. This information is then used for route calculation. OLSR provides optimal routes (in terms of number of hops). The protocol is particularly suitable for large and dense networks as the technique of MPRs works well in this context.},
note = {http://tools.ietf.org/html/rfc3626},
keywords = {Ad-Hoc, IETF, MANET, MESH, OLSR, RFC, Standard},
pubstate = {published},
tppubtype = {misc}
}
Thomas Clausen; Anis Laouiti; Philippe Jacquet; Pascale Minet; Laurent Viennot; Cedric Adjih
Multicast Optimized Link State Routing Technical Report
2003.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, MESH, Multicast, OLSR
@techreport{LIX-NET-RR-10,
title = {Multicast Optimized Link State Routing},
author = {Thomas Clausen and Anis Laouiti and Philippe Jacquet and Pascale Minet and Laurent Viennot and Cedric Adjih},
url = {https://www.thomasclausen.net/wp-content/uploads/2022/05/RR-4721.pdf},
year = {2003},
date = {2003-02-01},
urldate = {2003-02-01},
publisher = {INRIA Research Report RR-4721},
abstract = {This document describes the Multicast extension for the Optimized Link State
Routing protocol (MOLSR). MOLSR is in charge of building a multicast structure in order to route multicast traffic in an ad-hoc network. MOLSR is designed for mobile multicast routers, and works in a heterogenous network composed of simple unicast OLSR routers, MOLSR routers and hosts. In the last part of this document we introduce also a Wireless Internet Group Management Protocol (WIGMP). It offers the possibility for OLSR nodes (without multicast capabilities) to join multicast groups and receive multicast data.},
keywords = {Ad-Hoc, MANET, MESH, Multicast, OLSR},
pubstate = {published},
tppubtype = {techreport}
}
Routing protocol (MOLSR). MOLSR is in charge of building a multicast structure in order to route multicast traffic in an ad-hoc network. MOLSR is designed for mobile multicast routers, and works in a heterogenous network composed of simple unicast OLSR routers, MOLSR routers and hosts. In the last part of this document we introduce also a Wireless Internet Group Management Protocol (WIGMP). It offers the possibility for OLSR nodes (without multicast capabilities) to join multicast groups and receive multicast data.
2002
Thomas Clausen; Philippe Jacquet; Laurent Viennot
Comparative study of CBR and TCP performance of MANET routing protocols Proceedings Article
In: Workshop on Broadband Wireless Ad-Hoc Networks and Services, Sep 2002, Sophia-Antipolis, France. 2002, 2002.
Abstract | Links | BibTeX | Tags: Ad-Hoc, MANET, OLSR, Performance Evaluation
@inproceedings{Clausen2002f,
title = {Comparative study of CBR and TCP performance of MANET routing protocols},
author = {Thomas Clausen and Philippe Jacquet and Laurent Viennot},
url = {http://www.thomasclausen.net/wp-content/uploads/2018/05/2003-MESA-TCPPerformanceComparisoninMANETs.pdf},
year = {2002},
date = {2002-05-01},
booktitle = {Workshop on Broadband Wireless Ad-Hoc Networks and Services, Sep 2002, Sophia-Antipolis, France. 2002},
abstract = {In this paper, we evaluate the performance of two MANET routing protocols under varying
traffic, density and mobility conditions. We observe, that a rather large fraction of the traffic being carried on the Internet today carries TCP. Thus, Internet traffic has inheritly different characteristics than that of CBR traffic, which is the commonly used traffic type for evaluating MANET routing protocol performance. Hence, in this paper, we extend our evaluations of the two protocols to include the performance of both TCP and CBR traffic. We find, that testing a protocol using CBR traffic is not a good indicator for the same protocols performance when subject to TCP traffic.},
keywords = {Ad-Hoc, MANET, OLSR, Performance Evaluation},
pubstate = {published},
tppubtype = {inproceedings}
}
traffic, density and mobility conditions. We observe, that a rather large fraction of the traffic being carried on the Internet today carries TCP. Thus, Internet traffic has inheritly different characteristics than that of CBR traffic, which is the commonly used traffic type for evaluating MANET routing protocol performance. Hence, in this paper, we extend our evaluations of the two protocols to include the performance of both TCP and CBR traffic. We find, that testing a protocol using CBR traffic is not a good indicator for the same protocols performance when subject to TCP traffic.