Fig.2. Network example: A is the attacker, T is the Target.
4. The nodes that can compare the neighborhood of the attacker and the target neigh-
bors (which provide reachability to the 2 hop neighbors of the target advertised by
the attacker).
To illustrate the attack detection, we take the example presented in figure 2. The
attack takes place according to the following steps :
1. The attacker A identifies target T , its neighbors {N1, N2, N7, N 8, N20} and 2
hop neighbors {N 3, N7, N 8, N9, N12, N11, N21, N22}.
2. The attacker A detects its common neighbors with the target T : (N1, N 2, N20),
and modifies its HELLO messages to advertise their neighbors (N7, N8, N 9, N21,
N22) as its symmetric neighbors: NS
A
= {T, N1, N 2, N3, N5, N 6, N20, N7,
N8, N9, N21, N22, X} (X is the additional fictitious node).
3. The attacker advertises as its MPR selectors the target’s 2 hop neighbors in its TC
messages: N7, N 8, N9, N21, N22 ∈ T C
A
.
According to OLSR specification, the target T has to select the attacker A as MPR,
allowing the attacker to control some target’s flows. In this example, the concerned
nodes are the target T , the target’s 2 hop neighbors N7, N 8, N9, N21, N22 since they
are advertised as symmetric neighbors by the attacker, and the neighbors of these nodes
since they are indirectly impacted by the attack (they should be neighbors of the attacker
but they are not), and the nodes that are able to correlate the information advertised by
the attacker with other information. Using the previous formulae, all the concerned
nodes are able to detect the attack:
1. The target node T detect the attack using the following formulae:
– Formula 1: the node detect inconsistencybetween HELLO messages of N 7, N8
and A, where N7, N8 ∈ N S
A
but A /∈ N S
N7
, A /∈ N S
N8
.
– Formula 2: the node detect inconsistencybetween HELLO messages of N 7, N8
and TC message of A, where N 7, N8 ∈ T C
A
but A /∈ NS
N7
and A /∈ N S
N8
.
– Formula 3: in this example, the node N9 will select N 2 as MPR and nodes
N21, N22 will select N20 as MPR. In the reception of the TC messages of N 2
and N20, the target will detect inconsistency (3), because the neighborhood of
N2 and N20 are included in the attacker neighborhood, and nodes N2 and
N20 should not be selected as MPR.
155