Mechanism to Counteract Attacks in MANETS

Authors

  • Susmitha A  Department of ECE New Horizon College of Engineering, Bangalore, Karnataka, India
  • Lipsa Dash  Department of ECE New Horizon College of Engineering, Bangalore, Karnataka, India

Keywords:

MANET, OLSR, DOS, AODV

Abstract

Mobile adhoc networks has been experiencing tremendous growth in the last two decades as it possess a routable networking environment over a link layer adhoc network. Data is very important in today’s communication scenario and protecting this data has always been challenging for researchers to think in the direction of data security. Transmission of data through a secured route in a network is very important in today’s digital world. There are a number of protocols being proposed in context of MANETS among which OLSR is one of the frequently used for its efficiency in path calculation and bandwidth utilization. Protocols are usually vulnerable to various attacks while routing. This paper mainly focuses on mitigating denial of service attack as well as the black hole attack using fictitious node mechanism. The issues of denial of service attack and black hole attack is addressed by using the proposed algorithm which reduces the time of transaction and increases packet delivery ratio with less energy utilization. In this way proposed solution increases the performance of the network.

References

  1. Nadav Schweitzer, Ariel Stulman, Member, IEEE, AsafShabtai, and Roy David Margalit " Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes"
  2. P.Jacquet, P. Mijhlethaler, T.Clausen, A.LaouitiHipercom project, INRIA Rocquencourt, BP 105, 78153 Le chesnaycedex, france "optimistic link state routing protocol for ad hoc networks"
  3. IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 4, No.4, August 2014 103 "A SURVEY OF ROUTING ATTACKS IN MOBILE AD HOC NETWORK"
  4. HesiriWeerasinghe, IEEE Student Member, Huirong Fu, IEEE Member" Preventing Cooperative Black Hole Attacks in Mobile Ad HocNetworks: Simulation Implementation and Evaluation"
  5. S. Mclaughlin, D. Laurenson, and Y. Tan, "Mobile ad-hoc network." (Aug. 10 2006) uS Patent App. 11/351,777.Online].Available: http://www.google.com/patents/US20060176829
  6. M. Marimuthu and I. Krishnamurthi, "Enhanced olsr for defense against dos attack in ad hoc networks," Commun.Netw., J., vol. 15, no. 1, pp. 31–37, Feb. 2013.
  7. C. E. Perkins and P. Bhagwat, "Highly dynamic destinationsequenced distance-vector routing (dsdv) for mobile computers," in Proc. Conf. Commun. Archit., Protocols Appl., 1994, pp. 234–244.
  8. C. Perkins and E. Royer "Ad-hoc on-demand distance vector routing," in Proc. 2nd IEEE Workshop Mobile Comput. Syst. Appl., Feb. 1999, pp. 90–100.
  9. E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke, and J. Tolle, "Detecting black hole attacks in tactical manets using topology graphs," in Proc. 32nd IEEE Conf. Local Comput. Netw., Oct. 2007, pp. 1043–1052.
  10. C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the olsr protocol," in Proc. Med-Hoc-Net, 2003, pp. 25–27.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Susmitha A, Lipsa Dash, " Mechanism to Counteract Attacks in MANETS, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.532-538, May-June-2018.