Skip to main navigation Skip to search Skip to main content

Detecting bottlenecks on-the-fly in OLSR based MANETs

  • Nadav Schweitzer
  • , Ariel Stulman
  • , Tirza Hirst
  • , Roy David Margalit
  • , Meir Armon
  • , Asaf Shabtai

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations

    Abstract

    Attackers are usually interested in the important assets of the attack's target. In networks, bottleneck nodes - those that sit on many potential routes between sender and receiver - are the highest value asset that can be compromised. The dynamic nature of mobile ad-hoc networks (MANETs) causes ubiquitous routing algorithms to be even more susceptible to this class of attacks. Besides actually finding such bottleneck locations, an attacker can subvert the routing to create a virtual bottleneck. In this paper we propose a method of detecting bottleneck nodes in MANETs based on the prevalent OLSR protocol without imposing additional network traffic. Once such a bottleneck has been discovered, we propose mitigation methods.

    Original languageEnglish
    Title of host publication2014 IEEE 28th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2014
    PublisherInstitute of Electrical and Electronics Engineers
    ISBN (Electronic)9781479959877
    DOIs
    StatePublished - 1 Jan 2014
    Event2014 28th IEEE Convention of Electrical and Electronics Engineers in Israel, IEEEI 2014 - Eilat, Israel
    Duration: 3 Dec 20145 Dec 2014

    Publication series

    Name2014 IEEE 28th Convention of Electrical and Electronics Engineers in Israel, IEEEI 2014

    Conference

    Conference2014 28th IEEE Convention of Electrical and Electronics Engineers in Israel, IEEEI 2014
    Country/TerritoryIsrael
    CityEilat
    Period3/12/145/12/14

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Detecting bottlenecks on-the-fly in OLSR based MANETs'. Together they form a unique fingerprint.

    Cite this