International Conference on Computer Communication and Networks CSI-COMNET-2011 |
Foundation of Computer Science USA |
COMNET - Number 1 |
Decmber 2011 |
Authors: Rauki Yadav, Naveen Hemrajani |
d50c6e57-6a01-472b-90b1-eac93d195395 |
Rauki Yadav, Naveen Hemrajani . Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network. International Conference on Computer Communication and Networks CSI-COMNET-2011. COMNET, 1 (Decmber 2011), 46-51.
The aim of this Paper is to study the performance of the OLSR protocol. This paper is about security issues in OLSR. There are many ways a malicious node can exploit the vulnerabilities to launch attack on network. OLSR is a proactive routing protocol, Control packets has been send by OLSR to build and update the topology. As a part of this paper I have simulated a new attack method against OLSR based ad-hoc networks named as detour attack. Initially the attack is simulated with one attacker then with multiple attacks and the overall performance of network is observed under attack as well as normal conditions .The observations are made with different set of topologies and for different positions of attacking nodes. Finally a detection technique is proposed to detect the presence of an attacker node carrying out Detour attack