Skip to main content

Strategic Modeling of Secure Routing Decision in OLSR Protocol in Mobile Ad-Hoc Network

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 575))

Abstract

Optimized Link State Routing (OLSR) is known for its potential features for leveraging the communication requirement in mobile ad-hoc network. However, there is less number of investigations to confirm its sustainability as well as resiliency against potential threats in mobile ad-hoc network. Hence, this paper presents a modeling of misbehaved nodes to compliment intrusion detection system for mobile nodes using OLSR using the strategic construction of secure routing decision in OLSR protocol. The technique allows each communicating mobile nodes to monitor reputation, suspicion factor, and contingency of threat to compute the degree of its vulnerability. The modeling is quite capable of truly exploring the latent adversaries within the network in the form of normal nodes. The study outcome shows proposed algorithm on OLSR to possess reduced delay, reduced algorithm processing time and maximized throughput in contrast to conventional OLSR.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications. CRC Press, Boca Raton (2016)

    Google Scholar 

  2. Lin, X., Lu, R.: Vehicular Ad Hoc Network Security and Privacy. Wiley, Hoboken (2015)

    Book  Google Scholar 

  3. Patel, D.N., Patel, S.B., Kothadiya, H.R., Jethwa, P.D., Jhaveri, R.H.: A survey of reactive routing protocols in MANET. In: IEEE-International Conference on Information Communication and Embedded Systems, Chennai, pp. 1–6 (2014)

    Google Scholar 

  4. Abdelaziz, A.K., Nafaa, M., Salim, G.: Survey of routing attacks and countermeasures in mobile ad hoc networks. In: UKSim 15th International Conference on Computer Modelling and Simulation, Cambridge, pp. 693–698 (2013)

    Google Scholar 

  5. Chawda, K., Gorana, D.: A survey of energy efficient routing protocol in MANET. In: IEEE-2nd International Conference on Electronics and Communication Systems, Coimbatore, pp. 953–957 (2015)

    Google Scholar 

  6. Gupta, H., Pandey, P.: Survey of routing base congestion control techniques under MANET. In: IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology, Tirunelveli, pp. 241–244 (2013)

    Google Scholar 

  7. Loo, J., Mauri, J.L., Ortiz, J.H.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016)

    Google Scholar 

  8. Prasad, B.V.V.S.: Routing Issues in MANETs. Educreation Publishing, Dwarka (2016)

    Google Scholar 

  9. Lakhtaria, K.I.: Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends: Research Trends. IGI GLobal, Hershey (2012)

    Book  Google Scholar 

  10. Kumar, S.R., Gayathri, N.: Trust based data transmission mechanism in MANET using sOLSR. In: Subramanian, S., Nadarajan, R., Rao, S., Sheen, S. (eds.) CSI 2016. CCIS, vol. 679, pp. 169–180. Springer, Singapore (2016). doi:10.1007/978-981-10-3274-5_14

    Chapter  Google Scholar 

  11. Khan, M.S., Khan, M.I., Malik, S-Ur-R., Khalid, O., Azim, M., Javaid, N.: MATF: a multi-attribute trust framework for MANETs. EURASIP J. Wireless Commun. Networking (2016)

    Google Scholar 

  12. Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mobile Comput. 15(1), 163–172 (2016)

    Article  Google Scholar 

  13. Dutta, C.B., Biswas, U.: Specification based IDS for camouflaging wormhole attack in OLSR. In: IEEE-23rd Mediterranean Conference on Control and Automation (2015)

    Google Scholar 

  14. Amraoui, H., Habbani, A., Hajami, A.: Effect of selfish behaviour on OLSR and AODV routing protocols in MANETs. In: IEEE Global Summit on Computer & Information Technology, Sousse, pp. 1–6 (2014)

    Google Scholar 

  15. Malik, D., Rizvi, M.A.: Prevention of node isolation attack on OLSR by DFOLSR. In: ACM-International Conference on Information and Communication Technology for Competitive Strategies (2014)

    Google Scholar 

  16. Selvi, K.T., Kuppuswami, S.: Enhancing security in optimized link state routing protocol for MANET using threshold cryptography technique. In: IEEE-International Conference on Recent Trends in Information Technology (2014)

    Google Scholar 

  17. Alattar, M., Sailhan, F., Bourgeois, J.: On lightweight intrusion detection: modeling and detecting intrusions dedicated to OLSR protocol. Int. J. Distrib. Sens. Netw. (2013). Hindawi Publishing Corporation

    Google Scholar 

  18. Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. IEEE J. Commun. Netw. 15(1), 31–37 (2013)

    Article  Google Scholar 

  19. Sadeghi, M., Yahya, S.: Analysis of Wormhole attack on MANETs using different MANET routing protocols. In: IEEE-Fourth International Conference on Ubiquitous and Future Networks, Phuket, pp. 301–305 (2012)

    Google Scholar 

  20. Campos, J., Calafate, C.T., Nacher, M., Manzoni, P., Cano, J-C.: HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms. EURASIP J. Wireless Commun. Netw. (2011). Hindawi Publishing Corporation

    Google Scholar 

  21. Adoni, K.A., Tavildar, A.S.: Trust aware routing framework for OLSR protocol to enhance performance of mobile ad-hoc networks. In: IEEE-International Conference on Pervasive Computing (2015)

    Google Scholar 

  22. Suresh, L., Kaur, R., Gaur, M.S., Laxmi, V.: A collusion attack detection method for OLSR-Based MANETs employing scruple packets. In: ACM-Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 256–262 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C.K. Vanamala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Vanamala, C., Raghvendra Rao, G. (2017). Strategic Modeling of Secure Routing Decision in OLSR Protocol in Mobile Ad-Hoc Network. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57141-6_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57140-9

  • Online ISBN: 978-3-319-57141-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics