Contact Project Developer Ashish D. Tiwari [astiwz@gmail.com]
Download Synopsis Abstract
Cloud Java Networking BE-Engineering(CO/IT) ME-Engineering(CO/IT) BCS MCS BCA MCA MCM BSC Computer/IT MSC Computer/IT Diploma (CO/IT) IEEE-2016

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET) geared towards routingefficiency, the resulting protocols tend to be vulnerable to various a
Abstract-Synopsis-Documentation

Abstract

With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET) geared towards routingefficiency, the resulting protocols tend to be vulnerable to various attacks. Over the years, emphasis has also been placed on improvingthe security of these networks. Different solutions have been proposed for different types of attacks, however, these solutions oftencompromise routing efficiency or network overload. One major DOS attack against the Optimized Link State Routing protocol (OLSR)known as the node isolation attack occurs when topological knowledge of the network is exploited by an attacker who is able to isolatethe victim from the rest of the network and subsequently deny communication services to the victim. In this paper, we suggest a novelsolution to defend the OLSR protocol from node isolation attack by employing the same tactics used by the attack itself. Throughextensive experimentation, we demonstrate that 1) the proposed protection prevents more than 95 percent of attacks, and 2) theoverhead required drastically decreases as the network size increases until it is non-discernable. Last, we suggest that this type ofsolution can be extended to other similar DOS attacks on OLSR.


View





Comment is Only Available for registered users! Create Account or Login Now!