SlideShare a Scribd company logo
Enhanced OLSR for Defense against DOS Attack in Ad Hoc
Networks
ABSTRACT:
A mobile ad hoc network (MANET) refers to a network designed for special
applications for which it is difficult to use a backbone network. In MANETs,
applications are mostly involved with sensitive and secret information. Since
MANET assumes a trusted environment for routing, security is a major issue. In
this paper we analyze the vulnerabilities of a pro-active routing protocol called
optimized link state routing (OLSR) against a specific type of denial-of-service
(DOS) attack called node isolation attack. Analyzing the attack, we propose a
mechanism called enhanced OLSR (EOLSR) protocol which is a trust based
technique to secure the OLSR nodes against the attack. Our technique is capable of
finding whether a node is advertising correct topology information or not by
verifying its Hello packets, thus detecting node isolation attacks. The experiment
results show that our protocol is able to achieve routing security with 45% increase
in packet delivery ratio and 44% reduction in packet loss rate when compared to
standard OLSR under node isolation attack. Our technique is light weight because
it doesn’t involve high computational complexity for securing the networks.
EXISTING SYSTEM:
When a network topology changes, respective updates must be propagated
throughout the network to notify the change. In reactive routing protocols for
mobile ad hoc networks, which are also called “on-demand” routing protocols,
routing paths are searched for, when needed. Even though many research works
had been carried out for routing attacks in MANET, most of it concentrated mainly
on reactive routing protocols. Optimized link state routing (OLSR) routing
protocol which is a proactive routing protocol offers promising performance in
terms of bandwidth and traffic overhead but it does not incorporate any security
measures.
DISADVANTAGES OF EXISTING SYSTEM:
OLSR is vulnerable to various kinds of attacks such as flooding attack, link
withholding attack, replay attack, denial-of-service (DOS) attack and colluding
misrelay attack.
PROPOSED SYSTEM:
In this paper, we analyze a specific DOS attack called node isolation attack and
propose a solution for it. Node isolation attack can be easily launched on OLSR
after observing the network activity for a period of time. We propose a solution
called enhanced OLSR (EOLSR) that is based on verifying the hello packets
coming from the node before selecting it as a multipoint relay (MPR) node for
forwarding packets.
ADVANTAGES OF PROPOSED SYSTEM:
The proposed solution called EOLSR, which is based on OLSR, uses a
simple verification scheme of hello packets coming from neighbor nodes to
detect the malicious nodes in the network.
The experiment results show that the percentage of packets received through
our proposed work is better than OLSR in presence of multiple attacker
nodes.
Compared to other related works, the proposed protocol has more merits; the
most important merit is that it achieves degradation in packet loss rate
without any computational complexity or promiscuous listening.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command
Language)
REFERENCE:
Mohanapriya Marimuthu and Ilango Krishnamurthi “Enhanced OLSR for Defense
against DOS Attack in Ad Hoc Networks”- JOURNAL OF
COMMUNICATIONS AND NETWORKS, VOL. 15, NO. 1, FEBRUARY
2013.

More Related Content

PDF
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
DOC
Agent based intrusion detection, response and blocking using signature method...
PPTX
PROTOCOL MECHNISM FOR SECURITY ppt
PPT
Security in WSN
PDF
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
PDF
A key management approach for wireless sensor networks
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
Agent based intrusion detection, response and blocking using signature method...
PROTOCOL MECHNISM FOR SECURITY ppt
Security in WSN
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
A key management approach for wireless sensor networks
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...

What's hot (20)

PPT
Security and privacy in Wireless Sensor Networks
PDF
Firewall
PPTX
Security in wireless sensor network
PDF
Security Key Management Model for Low Rate Wireless Personal Area Networks
PDF
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
PDF
2.espk external agent authentication and session key establishment using publ...
DOCX
Firewall
PDF
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
PDF
Overview on security and privacy issues in wireless sensor networks-2014
PDF
Ii3415521555
PPT
security in wireless sensor networks
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
PPTX
FIREWALLS BY SAIKIRAN PANJALA
DOC
Wireless networks security
PPTX
11011 a0449 secure routing wsn
PPTX
Wireless sensor network security
PPT
An Architectural Concept for Intrusion Tolerance in Air Traffic Networks
PPT
Testbed For Ids
DOCX
Effective Key Management in Dynamic Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
Firewall
Security in wireless sensor network
Security Key Management Model for Low Rate Wireless Personal Area Networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
2.espk external agent authentication and session key establishment using publ...
Firewall
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Overview on security and privacy issues in wireless sensor networks-2014
Ii3415521555
security in wireless sensor networks
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
FIREWALLS BY SAIKIRAN PANJALA
Wireless networks security
11011 a0449 secure routing wsn
Wireless sensor network security
An Architectural Concept for Intrusion Tolerance in Air Traffic Networks
Testbed For Ids
Effective Key Management in Dynamic Wireless Sensor Networks
Ad

Viewers also liked (19)

DOCX
Optimal multicast capacity and delay tradeoffs in mane ts
DOCX
A load balancing model based on cloud partitioning for the public cloud
DOCX
Load rebalancing for distributed file systems in clouds
DOCX
Research in progress defending android smartphones from malware attacks
DOCX
Clustering sentence level text using a novel fuzzy relational clustering algo...
DOCX
Intrusion detection technique by using k means, fuzzy neural network and svm ...
DOCX
Delay based network utility maximization
DOCX
Cam cloud assisted privacy preserving mobile health monitoring
DOCX
An efficient and robust addressing protocol for node autoconfiguration in ad ...
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
PDF
2013 2014 ieee java project titles
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOCX
Trusted db a trusted hardware based database with privacy and data confidenti...
PDF
2013 14 ieee matlab titles
DOCX
Localization of wireless sensor networks in the wild pursuit of ranging quality
DOCX
M privacy for collaborative data publishing
DOCX
A generalized flow based method for analysis of implicit relationships on wik...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Toward accurate mobile sensor network localization in noisy environments
Optimal multicast capacity and delay tradeoffs in mane ts
A load balancing model based on cloud partitioning for the public cloud
Load rebalancing for distributed file systems in clouds
Research in progress defending android smartphones from malware attacks
Clustering sentence level text using a novel fuzzy relational clustering algo...
Intrusion detection technique by using k means, fuzzy neural network and svm ...
Delay based network utility maximization
Cam cloud assisted privacy preserving mobile health monitoring
An efficient and robust addressing protocol for node autoconfiguration in ad ...
A probabilistic misbehavior detection scheme towards efficient trust establis...
2013 2014 ieee java project titles
A rank correlation based detection against distributed reflection do s attacks
Trusted db a trusted hardware based database with privacy and data confidenti...
2013 14 ieee matlab titles
Localization of wireless sensor networks in the wild pursuit of ranging quality
M privacy for collaborative data publishing
A generalized flow based method for analysis of implicit relationships on wik...
Scalable and secure sharing of personal health records in cloud computing usi...
Toward accurate mobile sensor network localization in noisy environments
Ad

Similar to Enhanced olsr for defense against dos attack in ad hoc networks (20)

PDF
Exclusion of Denial of Service Attack using Graph Theory in MANETS
PDF
Paper id 311201512
PDF
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
PDF
PDF
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
PDF
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
PDF
Secure routing Adhoc Networks
PDF
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
PDF
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
PDF
Fv3510271037
PDF
Enhanced Secure Routing Model for MANET
PDF
Optimised Proactive Link State Routing For DOS Attack Prevention
PDF
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
PDF
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
PDF
M017248993
PDF
Performance measurement of MANET routing protocols under Blackhole security a...
PPTX
Performance Analysis of OLSR routing protocol In MANET Considering different ...
PDF
Optimized Link State Routing in wireless (OLSR).pdf
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Paper id 311201512
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2)
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Secure routing Adhoc Networks
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
Fv3510271037
Enhanced Secure Routing Model for MANET
Optimised Proactive Link State Routing For DOS Attack Prevention
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
M017248993
Performance measurement of MANET routing protocols under Blackhole security a...
Performance Analysis of OLSR routing protocol In MANET Considering different ...
Optimized Link State Routing in wireless (OLSR).pdf
Malicious attack detection and prevention in ad hoc network based on real tim...

Recently uploaded (20)

PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
IGGE1 Understanding the Self1234567891011
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Empowerment Technology for Senior High School Guide
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
History, Philosophy and sociology of education (1).pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Computing-Curriculum for Schools in Ghana
Chinmaya Tiranga quiz Grand Finale.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Final Presentation General Medicine 03-08-2024.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Digestion and Absorption of Carbohydrates, Proteina and Fats
IGGE1 Understanding the Self1234567891011
Paper A Mock Exam 9_ Attempt review.pdf.
UNIT III MENTAL HEALTH NURSING ASSESSMENT
A systematic review of self-coping strategies used by university students to ...
Final Presentation General Medicine 03-08-2024.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf

Enhanced olsr for defense against dos attack in ad hoc networks

  • 1. Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks ABSTRACT: A mobile ad hoc network (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn’t involve high computational complexity for securing the networks. EXISTING SYSTEM:
  • 2. When a network topology changes, respective updates must be propagated throughout the network to notify the change. In reactive routing protocols for mobile ad hoc networks, which are also called “on-demand” routing protocols, routing paths are searched for, when needed. Even though many research works had been carried out for routing attacks in MANET, most of it concentrated mainly on reactive routing protocols. Optimized link state routing (OLSR) routing protocol which is a proactive routing protocol offers promising performance in terms of bandwidth and traffic overhead but it does not incorporate any security measures. DISADVANTAGES OF EXISTING SYSTEM: OLSR is vulnerable to various kinds of attacks such as flooding attack, link withholding attack, replay attack, denial-of-service (DOS) attack and colluding misrelay attack. PROPOSED SYSTEM: In this paper, we analyze a specific DOS attack called node isolation attack and propose a solution for it. Node isolation attack can be easily launched on OLSR after observing the network activity for a period of time. We propose a solution called enhanced OLSR (EOLSR) that is based on verifying the hello packets coming from the node before selecting it as a multipoint relay (MPR) node for forwarding packets.
  • 3. ADVANTAGES OF PROPOSED SYSTEM: The proposed solution called EOLSR, which is based on OLSR, uses a simple verification scheme of hello packets coming from neighbor nodes to detect the malicious nodes in the network. The experiment results show that the percentage of packets received through our proposed work is better than OLSR in presence of multiple attacker nodes. Compared to other related works, the proposed protocol has more merits; the most important merit is that it achieves degradation in packet loss rate without any computational complexity or promiscuous listening. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 4. SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2  Front End : OTCL (Object Oriented Tool Command Language) REFERENCE: Mohanapriya Marimuthu and Ilango Krishnamurthi “Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks”- JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 15, NO. 1, FEBRUARY 2013.