Skip to main content
Erschienen in: Cluster Computing 5/2019

13.01.2018

Denial of service attack solution in OLSR based manet by varying number of fictitious nodes

verfasst von: R. Bhuvaneswari, R. Ramachandran

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Mobile Ad Hoc Network (MANET) is formed by group of mobile nodes and such group of nodes is flexible in creating links with the other nodes in the network frequently. The routing protocols in the network layer helps in transmitting the data packets between the nodes in the network. The wireless devices use electromagnetic waves or the infrared waves as medium of transmission and each device have antennas for communication. This wireless channel is very unreliable and also unprotected from the interferences from outside. The optimized link state routing (OLSR) protocol is an optimization of pure link state routing protocol. In this paper, the focus is on the active denial of service (DoS) attacks in the network layer routing protocol OLSR. Fictitious node based detection of DoS attacks are proposed by varying the number of fictitious nodes for particular number of network nodes and the parameters throughput,delay,packet delivery ratio and average delay are evaluated using network simulator and the results are compared.The number of fictitious nodes required for the maximum throughput of the given network is finally evaluated.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mulert, J.V., Welch, I., Seah, W.K.: Security threats and solutions in MANETs: a case study using AODV and SAODV. J. Netw. Comput. Appl. 35(4), 1249–1259 (2012)CrossRef Mulert, J.V., Welch, I., Seah, W.K.: Security threats and solutions in MANETs: a case study using AODV and SAODV. J. Netw. Comput. Appl. 35(4), 1249–1259 (2012)CrossRef
2.
Zurück zum Zitat Moudgil, S., Rana, S.: A secure and robust scheme to isolate DDoS attacks over MANET. Int. J. Comput. Sci. Issues 13(3), 31–38 (2016)CrossRef Moudgil, S., Rana, S.: A secure and robust scheme to isolate DDoS attacks over MANET. Int. J. Comput. Sci. Issues 13(3), 31–38 (2016)CrossRef
3.
Zurück zum Zitat Ahn, J.H., Lee, T.J.: Multipoint relay selection for robust broadcast in ad hoc networks. Ad Hoc Netw. 17, 82–97 (2014)CrossRef Ahn, J.H., Lee, T.J.: Multipoint relay selection for robust broadcast in ad hoc networks. Ad Hoc Netw. 17, 82–97 (2014)CrossRef
4.
Zurück zum Zitat Koul, A., Sharma, M.: Cumulative techniques for overcoming security threats in manets. Int. J. Comput. Netw. Inf. Secur. 7(5), 61–73 (2015) Koul, A., Sharma, M.: Cumulative techniques for overcoming security threats in manets. Int. J. Comput. Netw. Inf. Secur. 7(5), 61–73 (2015)
5.
Zurück zum Zitat Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: Analysis of the node isolation attack against olsr-based Mobile Ad Hoc Networks. In: International Symposium on Computer Networks, pp. 30–35 (2006) Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: Analysis of the node isolation attack against olsr-based Mobile Ad Hoc Networks. In: International Symposium on Computer Networks, pp. 30–35 (2006)
6.
Zurück zum Zitat Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: NIS01-2: A collusion attack against OLSR-based Mobile Ad Hoc Networks. Global Telecommunications Conference, IEEE GLOBECOM, vol. 2006, pp. 1–5 (2006) Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: NIS01-2: A collusion attack against OLSR-based Mobile Ad Hoc Networks. Global Telecommunications Conference, IEEE GLOBECOM, vol. 2006, pp. 1–5 (2006)
7.
Zurück zum Zitat Raffo, D., Adjih, C., Clausen, T., ühlethaler, P.M.: An advanced signature system for olsr. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ser. SASN ’04.New York, NY, USA: ACM, pp. 10–16 (2004) Raffo, D., Adjih, C., Clausen, T., ühlethaler, P.M.: An advanced signature system for olsr. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ser. SASN ’04.New York, NY, USA: ACM, pp. 10–16 (2004)
8.
Zurück zum Zitat Wang, M., Lamont, L., Mason, P., Gorlatova, M.: An effective intrusion detection approach for OLSR MANET protocol, 1st IEEE ICNP Workshop on Secure Network Protocols, pp. 55–60 (2005) Wang, M., Lamont, L., Mason, P., Gorlatova, M.: An effective intrusion detection approach for OLSR MANET protocol, 1st IEEE ICNP Workshop on Secure Network Protocols, pp. 55–60 (2005)
9.
Zurück zum Zitat Adnane, C., Bidan, C., De Sousa, R.T.: Trust-based security for the OLSR routing protocol. Comput. Commun. 36(10), 1159–1171 (2013)CrossRef Adnane, C., Bidan, C., De Sousa, R.T.: Trust-based security for the OLSR routing protocol. Comput. Commun. 36(10), 1159–1171 (2013)CrossRef
10.
Zurück zum Zitat Dhillon, D., Randhawa, T., Wang, M., Lamont, L.: Implementing a fully distributed certificate authority in an OLSR MANET. In: Wireless Communications and Networking Conference, 2004. (WCNC. 2004 IEEE), vol. 2, pp. 682–688 (2004) Dhillon, D., Randhawa, T., Wang, M., Lamont, L.: Implementing a fully distributed certificate authority in an OLSR MANET. In: Wireless Communications and Networking Conference, 2004. (WCNC. 2004 IEEE), vol. 2, pp. 682–688 (2004)
11.
Zurück zum Zitat Adjih, C., Raffo, D., Muhlethaler, P.: Attacks against OLSR: Distributed key management for security. In: 2nd OLSR Interop/Workshop. Palaiseau, France (2005) Adjih, C., Raffo, D., Muhlethaler, P.: Attacks against OLSR: Distributed key management for security. In: 2nd OLSR Interop/Workshop. Palaiseau, France (2005)
12.
Zurück zum Zitat Jeon, Y., Kim, T.H., Kim, Y., Kim, J.: Lt-olsr: Attack-tolerant olsr against link spoofing. In: Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012), ser. LCN ’12.Washington, DC, USA: IEEE Computer Society, pp. 216–219, (2012) Jeon, Y., Kim, T.H., Kim, Y., Kim, J.: Lt-olsr: Attack-tolerant olsr against link spoofing. In: Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012), ser. LCN ’12.Washington, DC, USA: IEEE Computer Society, pp. 216–219, (2012)
13.
Zurück zum Zitat Suresh, P., Kaur, R., Gaur, M., Laxmi, V.: Collusion attack resistance through forced MPR switching in OLSR. In: Wireless Days (WD), 2010 IFIP, pp. 1–5 (2010) Suresh, P., Kaur, R., Gaur, M., Laxmi, V.: Collusion attack resistance through forced MPR switching in OLSR. In: Wireless Days (WD), 2010 IFIP, pp. 1–5 (2010)
14.
Zurück zum Zitat Chriqi, A., Otrok, H., Robert, J.M.: SC-OLSR: Secure Clustering-Based OLSR Model for Ad-hoc Networks. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 239–245 (2009) Chriqi, A., Otrok, H., Robert, J.M.: SC-OLSR: Secure Clustering-Based OLSR Model for Ad-hoc Networks. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 239–245 (2009)
15.
Zurück zum Zitat Capkun, S., Buttyan, L., Hubaux, J.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, USA, pp. 21–32 (2003) Capkun, S., Buttyan, L., Hubaux, J.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, USA, pp. 21–32 (2003)
16.
Zurück zum Zitat Babu, M.N.K., Franklin, A.A., Murthy, C.S.R.: On the prevention of collusion attack in OLSR-based Mobile Ad-hoc Networks. In: 16th IEEE International Conference on Networks, p. 1 (2013) Babu, M.N.K., Franklin, A.A., Murthy, C.S.R.: On the prevention of collusion attack in OLSR-based Mobile Ad-hoc Networks. In: 16th IEEE International Conference on Networks, p. 1 (2013)
17.
Zurück zum Zitat Nadeem, A., Howarth, M.: A survey of manet intrusion detection and prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)CrossRef Nadeem, A., Howarth, M.: A survey of manet intrusion detection and prevention approaches for network layer attacks. IEEE Commun. Surv. Tutor. 15(4), 2027–2045 (2013)CrossRef
18.
Zurück zum Zitat Robert, J.M., Otrok, H., Chriqi, A.: RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput. Commun. 35, 487–499 (2012)CrossRef Robert, J.M., Otrok, H., Chriqi, A.: RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput. Commun. 35, 487–499 (2012)CrossRef
19.
Zurück zum Zitat Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mob. Comput. 15(1), 163–172 (2016)CrossRef Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mob. Comput. 15(1), 163–172 (2016)CrossRef
20.
Zurück zum Zitat Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)CrossRef Marimuthu, M., Krishnamurthi, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)CrossRef
Metadaten
Titel
Denial of service attack solution in OLSR based manet by varying number of fictitious nodes
verfasst von
R. Bhuvaneswari
R. Ramachandran
Publikationsdatum
13.01.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1723-0

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe