We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes

by Harish Shakywar, Sanjeev Sharma, Santoh Sahu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 35 - Number 3
Year of Publication: 2011
Authors: Harish Shakywar, Sanjeev Sharma, Santoh Sahu
10.5120/4379-6059

Harish Shakywar, Sanjeev Sharma, Santoh Sahu . Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes. International Journal of Computer Applications. 35, 3 ( December 2011), 7-12. DOI=10.5120/4379-6059

@article{ 10.5120/4379-6059,
author = { Harish Shakywar, Sanjeev Sharma, Santoh Sahu },
title = { Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 35 },
number = { 3 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume35/number3/4379-6059/ },
doi = { 10.5120/4379-6059 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:21:01.538544+05:30
%A Harish Shakywar
%A Sanjeev Sharma
%A Santoh Sahu
%T Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes
%J International Journal of Computer Applications
%@ 0975-8887
%V 35
%N 3
%P 7-12
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc networks are those networks which has no physical links between the nodes. In MANET mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing in a MANET is challenging because of the dynamic topology and the lack of an existing fixed infrastructure. In most of their specifications it is assumed that all the nodes in the network are friendly. But in the open, collaborative MANET environment practically any node can maliciously or selfishly disrupt and deny communication of other nodes. Security in MANET is a very difficult problem to incorporate without degrading the performance of the protocol. There are various security issues associated with OLSR and STAR routing protocols among which one is packet dropping by malicious node. In this paper we have proposed one approach to minimize the packet dropping by malicious nodes in the network by applying IPSec in OLSR and STAR routing protocols and compared the results with existing without IPSec protocols. The simulation results demonstrate the success of the proposed approach and maximize the overall performance of MANET in presence of malicious nodes.

References
  1. T.V.P. Sundarajan, Karthik and A. Shanmugam, “Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Netwroks” Proceedings of the International Conference on Mam- Machine Systems (ICoMMS), MALAYSIA, 11-13 October 2009.
  2. Santhosh Krishna B. V, Mrs. Vallikannu A. L, “Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Machanism”, International Journal of Scientific & Engineering Research, Volume 1, Issue 3, December-2010.
  3. Dr. G. Padmavathi, Dr. P. Subashini and Ms. D. Devi Aruna, “Hybrid Routing Protocols to secure Network Layer for Mobile Ad hoc Networks”, IEEE, 2010.
  4. Aishwarya Sagar Anand Ukey and MeenaChawla, “Detection of Packet Dropping attack Using Improved Acknowledgement Based Scheme in MANET”, IJCSI International journal of Computer Science Issue, Vol. 7, Issue 4, No 1, July 2010.
  5. IRSHAD ULLAH AND SHOAIB UR REHMAN, “Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols” Program Electrical Engineering with emphasis on Telecommunication, Type of thesis-Master Thesis, Electrical Engineering, Thesis no : MEE-2010-2698, June 2010.
  6. BOUNPADITH KANNHAVONG, HIDEHISA NAKAYAMA, YOUSHIAKI NEMOTO AND NEI KATO.“A SURVEY OF ROUTING ATTACKS IN MOBILE AD HOC NETWORKS”, IEEE Wireless Communications, October 2007.
  7. T. Clausen, Ed and P. Jacquet, Ed, “IETF RFC 3626, Optimized Link State Routing Protocol (OLSR)”, MANET working group, October 2003.
  8. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot*.“Optimized Link State routing Protocol for Ad Hoc Networks”, Multi Topic Conference, 2001. IEEE INMIC 2001 62-68, version 1-8 Apr 2010.
  9. J. J. Garcia-Luna-Aceves and M. Spohon, “Source-Tree Routing in Wireless Networks”, Proceedings of IEEE ICNP 1999, pp. 273-282, October 1999.
  10. Natarajan Meghanathan, “SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS”, The International Journal on Application of Graph Theory in Wireless Ad hoc Networks and Sensor networks (GRAPH-HOC), Vol. 1, December 2009
  11. Mike Just, EvangelosKranakis and Tao Wan, “Resisting Malicious Packet dropping in Wireless Ad Hoc Networks.” Springer Link, ADHOC-NOW 2003, LNCS 2865, pp 151-163, 2003
  12. Joshua D. Guttman, Any L. Herzog and Javier Thayer, “Authentication and confidentiality via IPsec*”, Appears in ESORICS, Springer LNCS, 30 June 2000.
  13. MATT BLAZE, JOHN IOANNIDIS and ANGELOS D. KEROMYTIS, “Trust Management for IPsec.” ACM Transactions on Information and System Security, Vol. 5, No. 2, Pages 95-118,May 2002.
  14. T. H. Clausen, G. Hansen, L. Christensen and G. Behrnmann, “The Optimized Link State Routing Protocol, Evaluation Through Experiments and Simulation,” Proceedings of IEEE Symposium on Wireless Personal Mobile Communications 2001, September 2001.
  15. QualNet documentation, “QualNet 5.0 Model Library, Network Security”, Available: http:// www.scalablenetworks.com/products/qualnet/downlaod.
Index Terms

Computer Science
Information Sciences

Keywords

IPSec OLSR STAR MANET Malicious node