Advertisement

Prevention of DOS and Routing Attack in OLSR Under MANET

  • Madhvi ChaurasiaEmail author
  • Bhanu Pratap Singh
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 34)

Abstract

The flourishing packets delivery up to destination is necessary for better network performance. In MANET, group of nodes is capable to create a temporary dynamic link without the support of any centralized administration and stuck infrastructure. In this research, we focus on and proposed security against DoS and routing attacks. The DoS attack and routing attack is a type of attack that are work together in dynamic network and performing misbehavior by consume link capacity and drop of data packets. However, in network if sender has begun data transmission, then in that case, both of the attackers’ mutual malicious behavior has produced a remarkable dump performance. In proposed security analysis, we proposed a novel detection and prevention security algorithm against both mutual attacks. In this research, we compare the performance of four protocols: first normal OLSR routing, OLSR routing with mutual attack, R-OLSR, and P-OLSR (proposed). The proposed scheme is able to provide secure communication and also improves the network performance. Through our proposal, we present secure as well as reliable communication in network from wormhole attack and compare the performance of different scenarios on the bases of parameters such as packet delivery magnitude relation, throughput, and routing load.

Keywords

MANET Security OLSR P-OLSR R-OLSR DoS Routing Attacker 

References

  1. 1.
    Sharma, T., Singh, L.: A detection technique for identity based attacks in clustered mobile ad-hoc networks. In: 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA) 978-1-4673-6911-4/15, IEEE (2015)Google Scholar
  2. 2.
    Singha, S., Das, A.: Detection and elimination of the topological threats in mobile ad hoc network: a new approach, 978-1-4673-6911-4/15, IEEE (2015)Google Scholar
  3. 3.
    Remya, S., Lakshmi, K.S.: SHARP: secured hierarchical anonymous routing protocol for MANETs. In: 2015 International Conference on Computer Communication and Informatics (ICCCI—2015), Jan 08–10, Coimbatore, India (2015)Google Scholar
  4. 4.
    Mane, A., Vora, D., Kelkar, S.: Design of a novel proactive link state routing approach to defense against node isolation attack in MANETs. Int. J. Sci. Eng. Res. 6(9) (2015)Google Scholar
  5. 5.
    Balaji, B., HasanKhan, M., Kumar, R.P.: Enhanced OLSR for defense against node isolation attack in ad hoc networks. (IJCSIT) Int. J. Comput. Sci. Info. Technol. 4(6), 1004–1009 (2013)Google Scholar
  6. 6.
    Johnson, D., Maltz, D., Hu, Y.-C.: The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, draft-ietf-manetdsr-10.txt, work in progress, pp. 153–181 (2004)Google Scholar
  7. 7.
    Park, V.D., Corson, M.S.: Temporally-ordered routing algorithm (TORA) version 1: functional specification. Internet draft, draft-ietf-manettora-spec-01.txt (1998)Google Scholar
  8. 8.
    Shivanakar, B.S., Thorat, S.A.: Addressing node isolation attack in OLSR protocol, 978-1-4799-8792-4/15, IEEE (2015)Google Scholar
  9. 9.
    Vidhya, K.U., Priya, M.M.: A novel technique for defending routing attacks in OLSR MANET. In: IEEE International Conference on Computational Intelligence and Computing Research (2010)Google Scholar
  10. 10.
    Deshmukh, V.J., Kaushik, S.S.: Routing attack survey for mobile ad hoc network. Int. J. Adv. Res. Comput. Commun. Eng. 2(4) (2013)Google Scholar
  11. 11.
    Bhavani, S., Kanchana Devi, S., Jaisharma, K.(AP): Detection of isolation attack in OLSR on MANET. Int. J. Eng. Sci. Comput. (2016)Google Scholar
  12. 12.
    Varghese, M.E., Sankar, P.: A secure OLSR against Dos attack in ad-hoc networks. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 4(3) (2015)Google Scholar
  13. 13.
    Jelba, L.M.M., Gomathi, S.: Mitigating different attacks in OLSR protocol—a survey. Int. J. Innov. Res. Comput. Commun. Eng. 4(6) (2016)Google Scholar
  14. 14.
    Kannhavong, B., Nakayama, H., Jamalipour, A.: Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. In: Proceeding of the Seventh IEEE International Symposium on Computer Network, ISCN (2006)Google Scholar
  15. 15.
    Yuvan Shankar, R.K., Rama Prabha, K.P., Jayanthi, R.: Discovery against node isolation attack on MANET and it’s node removal. Int. J. Pharm. Technol. IJPT 8(3), 16391–16398 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceVindhya Institute of Technology & ScienceSatnaIndia

Personalised recommendations