CFP last date
20 January 2025
Reseach Article

Modified OLSR Protocol for Detection and Prevention of Packet Dropping Attack in MANET

by H. Zougagh, A. Toumanari, R. Latif, Y. Elmourabit, Noureddine Idboufker
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 17
Year of Publication: 2014
Authors: H. Zougagh, A. Toumanari, R. Latif, Y. Elmourabit, Noureddine Idboufker
10.5120/17617-8254

H. Zougagh, A. Toumanari, R. Latif, Y. Elmourabit, Noureddine Idboufker . Modified OLSR Protocol for Detection and Prevention of Packet Dropping Attack in MANET. International Journal of Computer Applications. 100, 17 ( August 2014), 32-38. DOI=10.5120/17617-8254

@article{ 10.5120/17617-8254,
author = { H. Zougagh, A. Toumanari, R. Latif, Y. Elmourabit, Noureddine Idboufker },
title = { Modified OLSR Protocol for Detection and Prevention of Packet Dropping Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 17 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number17/17617-8254/ },
doi = { 10.5120/17617-8254 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:30:12.770866+05:30
%A H. Zougagh
%A A. Toumanari
%A R. Latif
%A Y. Elmourabit
%A Noureddine Idboufker
%T Modified OLSR Protocol for Detection and Prevention of Packet Dropping Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 17
%P 32-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a flooding mechanism for distributing control traffic messages in the network, and reducing the redundancy in the flooding process. A node in an OLSR network selects its MPR set so that all two hop neighbor are reachable by the minimum number of MPR. However, if an MPR misbehaves during the execution of the protocol, the connectivity of the network is compromised. This paper introduces a new algorithm for the selection of Multipoint Relays (MPR) whose aims is to provide each node to selects alternative paths to reach any destination two hops away. This technique helps avoid the effect of malicious attacks and its easily to implement the corresponding algorithm without any additional overhead.

References
  1. J. Coriil, S. Ochoa, J. Pino. High level MANET protocol: Enhancing the communication support for mobile collaborative work. Elseiver journal of Network and Computer Applications. 2012; 35 (1), 145-155.
  2. P. Papadimitratos, Z. J. Haas, Secure message transmission in mobile ad hoc networks, in journal Ad Hoc networks. 2003; 1(1),193-209.
  3. Perkins C, Belding-Royer E, Das S. Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561, 2003.
  4. Johnson DB, Maltz DA, Hu Y-C. The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Internet Draft, draft-ietf-manet-dsr-09, 2003.
  5. T. Clausen, P. Jaquet, IETF Request for Comments: 3626 Optimized Link State Routing Protocol OLSR, october 2003.
  6. Ogier R, Lewis M, Templin F. Topology dissemination based on reverse-path forwarding (TBRPF). IETF Internet Draft, draft-ietf-manet-tbrpf-07. txt, 2003.
  7. J-H. Zygmunt : A new routing protocol for the recon_gurable wireless networks. In Proceedings of 6th IEEE International Conference on Universal Personal Communications, IEEE ICUPC'97, October 12-16, 1997, San Diego, California, USA, volume 2, pages 562{566. IEEE, IEEE, October 1997.
  8. Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer E. A secure routing protocol for ad hoc networks. Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), Paris, France, November 2002.
  9. Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Proceedings of the MobiCom 2002, Atlanta, Georgia, U. S. A. , 23–28 September 2002.
  10. Zapata MG. Secure ad hoc on-demand distance vector routing. ACM Mobile Computing and Communications Review (MC2R) 2002; 6(3):106–107.
  11. Zapata MG, Asokan N. Securing ad-hoc routing protocols. Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, U. S. A. , September 2002; 1–10.
  12. Hu Y-C, Johnson DB, Perrig A. SEAD: secure e?cient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002). IEEE: Calicoon, NY, June 2002; 3–13.
  13. Papadimitratos P, Haas Z. Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, 27–31 January, 2002.
  14. Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Networks Special Issue on Network Security, November/ December 1999; 24–30.
  15. C. Adjih, A. Laouiti, P. Minet, P. Muhlethan, A. Quayyum, L. Viennot. The Optimized Routing Protocol for Mobile ad hoc Networks: Protocol Specification. Projet HIPERCOM. INRIA research report N° 5145, March 2004.
  16. A. Adnane, R. T. de Sousa Jr. , C. Bidan, and L. Mé. Autonomic trust reasoning enables misbehavior detection in OLSR. In ACM Symposium on Applied computing (SAC), pages 2006–2013, New York, USA, 2008.
  17. F. Cuppens, N. Cuppens-Boulahia, T. Ramard, and J. Thomas. Misbehaviors detection to ensure availability in OLSR. In Mobile Sensor Networks (MSN), volume 4864 of Lecture Notes in Computer Science, pages 799–813. Springer, 2007.
  18. M. Wang, L. Lamont, P. Mason, M. Gorlatova, An effective intrusion detection approach for OLSR MANET protocol, in: Proceedings of the First International Conference on Secure Network Protocols (NPSEC), IEEE Computer Society, Washington, USA, 2005, pp. 55–60.
  19. Marti S, Giuli TJ, Kevin L, Mary B. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom'00); 2000. p. 255–65.
  20. Soufian Djahel, Farid Nait Abslam, Avoiding virtual link attack in wireless ad hoc networks, Proceeding of the 2008 IEEE/ACS Internetional conference of computer systems and application, p 355-360. March 31 avril 04, 2008.
  21. Rachid abdellaoui and Jean Marc Robert. SU-OLSR : A new solution to thwart attacks against the olsr protocol. Mster thesis. Height school of technology (ETS) Canada. 2009.
  22. Bounpadith Kannhavong , Hidehisa Nakayama , Nei Kato , Abbas Jamalipour , Yoshiaki Nemoto, A study of a routing attack in OLSR-based mobile ad hoc networks, International Journal of Communication Systems, 2007; 20 (11), p. 1245-1261.
  23. D. Djenouri, N. badach, On eliminating packet droppers in MANET: A modular solution. Ad Hoc Networks 2009; 7(6): 1243-58.
  24. A. Badach, A. Belmehdi, Fighting against packet dropping misbehavior in multi-hop wireless ad hoc network, Network and Computer Application 35(2012) 1130-1139.
  25. Rohit Pal, Mukesh Azad and Santosh Kumar. Article: An Approach to Combat the Blackhole Attack in AODV Routing Protocol. International Journal of Computer Applications 77(11):13-19, September 2013. Published by Foundation of Computer Science, New York, USA
Index Terms

Computer Science
Information Sciences

Keywords

MANET OLSR Security Routing Protocol Black Hole attack.