Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol

The main objective of routing protocol is to discover the route from any source to any destination in the network. For this need the MANET working group defined three categories of routing protocols: reactive protocols such as AODV, proactive protocols such as OLSR, and hybrid ones such as ZRP. OLSR is one of the famous routing protocols in wireless network in which routes are immediately available when needed. The key concept of this protocol is the using of nodes called Multipoint Rely (MPR). The MPR reduces the number of duplicated packets broadcasted in the network. This characteristic can be exploited by a misbehavior node and force selection it as MPR by spoofing links with nodes within the network. In this paper, we present the vulnerability of OLSR protocol versus a smart cooperative misbehaviors nodes. After that, we propose a new optimized scheme called Neighbors-Trust-Based. The main idea is the collaboration between neighbors to detect misbehaviors nodes. We demonstrate the feasibility of our scheme through a detailed simulation using NS2.

[1]  Ali Moussaoui,et al.  CRY OLSR: Crypto Optimized Link State Routing for MANET , 2016, 2016 5th International Conference on Multimedia Computing and Systems (ICMCS).

[2]  Imane Aly Saroit,et al.  Misbehavior nodes detection and isolation for MANETs OLSR protocol , 2011, WCIT.

[3]  Raj Kamal Kapur,et al.  Performance analysis of routing protocols under different types of attacks in MANETs , 2016, 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO).

[4]  H. L. Gururaj,et al.  Comparative Analysis of Black Hole Attack in Ad Hoc Network Using AODV and OLSR Protocols , 2016 .

[5]  Abderrahmane Baadache,et al.  Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks , 2014, Comput. Networks.

[6]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[7]  Sami Muhaidat,et al.  Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET , 2016, Veh. Commun..

[8]  C. K. Vanamala,et al.  Strategic Modeling of Secure Routing Decision in OLSR Protocol in Mobile Ad-Hoc Network , 2017, CSOC.

[9]  Asaf Shabtai,et al.  Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.

[10]  Gurpreet Singh,et al.  Comparative Study of OLSR, DSDV, AODV, DSR and ZRP Routing Protocols Under Blackhole Attack in Mobile Ad Hoc Network , 2018 .

[11]  Yogesh Sahu,et al.  Intruder detection mechanism against DoS attack on OLSR , 2016, 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS).

[12]  R. Bhuvaneswari,et al.  Denial of service attack solution in OLSR based manet by varying number of fictitious nodes , 2018, Cluster Computing.

[13]  Pascal Lorenz,et al.  Black hole attack detection and ignoring in OLSR protocol , 2017, Int. J. Trust. Manag. Comput. Commun..

[14]  Pankaj Kumar Varshney,et al.  Relative Performance Analysis of Proactive Routing Protocols in Wireless Ad hoc Networks using Varying Node Density , 2016 .