To Improve The Security Of OLSR Routing Protocol Based On Local Detection Of Link Spoofing

Vakkalagadda IndraUsha Rani, K. Tirumala Reddy

Abstract


We survey a particular DOS attack called node separation attack and propose another moderation technique. Our answer called Denial Contradictions with Fictitious Node Mechanism (DCFM) depends on the interior information gained by every node amid routine directing, and growth of virtual (imaginary) nodes. Additionally, DCFM uses similar methods utilized by the attack so as to avert it. The overhead of the extra virtual nodes decreases as system size builds, which is steady with general claim that OLSR capacities best on huge systems. The proposed insurance avoids more than 95 percent of attacks, and the overhead required definitely diminishes as the system measure increments until it is non-discernable.


References


S. Mclaughlin, D. Laurenson, and Y. Tan, “Mobile ad-hoc network.” (Aug. 10 2006) uS Patent App. 11/351,777. [Online]. Available: http://www.google.com/patents/US20060176829

C. E. Perkins and P. Bhagwat, “Highly dynamic destinationsequenced distance-vector routing (dsdv) for mobile computers,” in Proc. Conf. Commun. Archit., Protocols Appl., 1994, pp. 234–244.

P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized link state routing protocol for ad hoc networks,” in Proc. IEEE Int. Multi Topic Conf. Technol., 2001, pp. 62–68.

T. Clausen and P. Jacquet, “RFC 3626-Optimized Link State Routing Protocol (OLSR),” p. 75, 2003. [Online]. Available: http:// www.ietf.org/rfc/rfc3626.txt

D. Johnson, Y. Hu, and D. Maltz, “Rfc: 4728,” Dynamic Source Routing Protocol (DSR) Mobile Ad Hoc Netw. IPV4, 2007. [Online]. Available: http://tools.ietf.org/html/rfc4728

C. Perkins and E. Royer “Ad-hoc on-demand distance vector routing,” in Proc. 2nd IEEE Workshop Mobile Comput. Syst. Appl.,

Feb. 1999, pp. 90–100.

E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke, and J. Tolle, “Detecting black hole attacks in tactical manets using topology graphs,” in Proc. 32nd IEEE Conf. Local Comput. Netw., Oct. 2007, pp. 1043–1052.

C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, and D. Raffo, “Securing the olsr protocol,” in Proc. Med-Hoc-Net, 2003, pp. 25–27.

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks,” IEEE Wireless Commun., vol. 14, no. 5, pp. 85–91, Oct. 2007.

D. Dhillon, J. Zhu, J. Richards, and T. Randhawa, “Implementation & evaluation of an ids to safeguard olsr integrity in manets,” in Proc. Int. Conf. Wireless Commun. Mobile Comput., 2006, pp. 45–50.

D. Raffo, C. Adjih, T. Clausen, and P. M€uhlethaler, “An advanced signature system for OLSR,” in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 10–16.

C. Adjih, D. Raffo, and P. M€uhlethaler, “Attacks against OLSR: Distributed key management for security,” in Proc. 2nd OLSR

Interop/Workshop, Palaiseau, France, 2005.

Y.-C. Hu, A. Perrig, and D. Johnson, “Wormhole attacks in wireless networks,” IEEE J. Selected Areas Commun.., vol. 24, no. 2, pp. 370–380, Feb. 2006.

B. Kannhavong, H. Nakayama, and A. Jamalipour, “Nis01-2: A collusion attack against olsr-based mobile ad hoc networks” in

Proc. IEEE Global Telecommun. Conf., Nov. 2006, pp. 1–5.

B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Analysis of the node isolation attack against olsrbased mobile ad


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.