Modified OLSR Protocol for Detection and Prevention of Packet Dropping Attack in MANET

Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Network. It operates as a table driven, proactive protocol. The core of the OLSR protocol is the selection of Multipoint Relays (MPRs), used as a flooding mechanism for distributing control traffic messages in the network, and reducing the redundancy in the flooding process. A node in an OLSR network selects its MPR set so that all two hop neighbor are reachable by the minimum number of MPR. However, if an MPR misbehaves during the execution of the protocol, the connectivity of the network is compromised. This paper introduces a new algorithm for the selection of Multipoint Relays (MPR) whose aims is to provide each node to selects alternative paths to reach any destination two hops away. This technique helps avoid the effect of malicious attacks and its easily to implement the corresponding algorithm without any additional overhead.

[1]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[2]  Jing Liu,et al.  Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[3]  José A. Pino,et al.  High level MANET protocol: Enhancing the communication support for mobile collaborative work , 2012, J. Netw. Comput. Appl..

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[6]  Santosh Kumar,et al.  An Approach to Combat the Blackhole Attack in AODV Routing Protocol , 2013 .

[7]  M. Priyadharshini,et al.  HIGH LEVEL MANET PROTOCOL: ENHANCING THE COMMUNICATION SUPPORT FOR MOBILE COLLABORATIVE WORK , 2013 .

[8]  Nora Cuppens-Boulahia,et al.  Misbehaviors Detection to Ensure Availability in OLSR , 2007, MSN.

[9]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[10]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[11]  M. Wang,et al.  An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[12]  Zygmunt J. Haas,et al.  A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[15]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[16]  Nei Kato,et al.  A study of a routing attack in OLSR-based mobile ad hoc networks , 2007, Int. J. Commun. Syst..

[17]  Jean-Marc Robert,et al.  SU-OLSR : a new solution to thwart attacks against the OLSR protocol , 2009 .

[18]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[19]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[20]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[21]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[22]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[23]  Djamel Djenouri,et al.  On eliminating packet droppers in MANET: A modular solution , 2009, Ad Hoc Networks.

[24]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[25]  Fred L. Templin,et al.  Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.