IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 3, March 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Performance Impacts Of Multipoint Relay Attack Against OLSR Protocol

[Full Text]

 

AUTHOR(S)

Abderrahim HAJJI SOUALFI, Said AGOUJIL

 

KEYWORDS

inetmanet, Mobile Ad Hoc Network, MPR attack, OLSR, Omnetpp, Security.

 

ABSTRACT

A Mobile Ad-hoc NETwork (MANET) is an assembly of nodes with extreme flexible topology for establishing wireless communications and forming a dynamic network. In order to enable conversation between any nodes in a network, a routing protocol is employed. Currently, there are three major routing protocols classes: reactive, proactive and hybrid protocols. Optimized Link State Routing Protocol (OLSR) is one of the most used in MANET. It operates in table driven of proactive protocol. A major problem facing this protocol (OLSR) is security. Multipoint relay (MPR) attack is considered like the most efficient attack.This paper is organized into four large sections. In the first section, we talk about the main goal of "multipoint relays" (MPRs). Second Section is dedicated to the routing layer attack, especially MPR attack. The third section introduces simulation measurements and network layout. Finally, we discuss the simulation results in the last section, before concluding our paper.

 

REFERENCES

[1] P.Jacquest, P.Mahetethaler and T. Chausen. “Optimized link state Routing Protocol for Adhoc networks”, Hipercom project BP 105, 78103 Le cheshaycedex, France.
[2] Ankur O. Bang, Prabhakar L. Ramteke. “MANET: History, Challenges and Applications”. International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 9, September 2013.
[3] K.P. Manikandan, Dr. R. Satyaprasad and Dr. K. Rajasekhararao. “A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks”. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 2, No.3, March 2011.
[4] Clausen Ed. and Jacquet Ed., “Optimized Link State Routing Protocol”. IETF: The Internet Engineering Task Force, RFC 3626, October 2003.
[5] Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato and Abbas Jamalipour. “A survey of routing attacks in mobile ad hoc networks”. IEEE Wireless Communications, October 2007.
[6] Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour and Yoshiaki Nemoto. “A study of a routing attack in OLSR-based mobile ad hoc networks”. International journal of communication systems, March 2007.
[7] Ayoub Abdellaoui, Jamal Elmhamdi and Halim Berradi. “Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks”. International Journal of Communication Networks and Information Security (IJCNIS), Vol. 10, No. 1, April 2018.
[8] Mohamed Amine FERRAG, and Mehdi NAFAA. “Securing the OLSR routing protocol for Ad Hoc Detecting and Avoiding Wormhole Attack”. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.
[9] Cédric Adjih, Thomas Clausen, Anis Laouiti, Paul Mühlethaler, and Daniele Raffo. “Securing the OLSR routing protocol with or without compromised nodes in the network”. Technical Report INRIA RR-5494, HIPERCOM Project, INRIA Rocquencourt, February 2005.
[10] Trapti Jain and Savita Shiwani. “Analysis of OLSR, DSR, DYMO Routing Protocols in Mobile Ad-Hoc Networks using Omnetpp Simulation”. Global Journal of Computer Science and Technology: E Network, Web & Security. Volume 14 Issue 1 Version 1.0, 2014.
[11] Sukhwinder Kaur, R K Bansal and Savina Bansal. “Performance Analysis of AODV, DSR and OLSR Routing Techniques for Ad-Hoc Mobile Networks”. International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR). Vol. 3, Issue 5, Dec 2013, 195-200.
[12] Ravi Kumar, Prabhat Singh. “Performance analysis of AODV, TORA, OLSR and DSDV Routing Protocols using NS2 Simulation”. International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Vol. 2, Issue 8, August 2013.
[13] Ratul Dey, Himadri Nath Saha. “Different Routing Threats and its Mitigations Schemes for Mobile ad-hoc Networks (MANETs) –A Review”. IPASJ International Journal of Electronics & Communication (IIJEC), Volume 4, Issue 3, March 2016.