Open Access Open Access  Restricted Access Subscription or Fee Access

Simulation Analysis of Secure OLSR Routing Protocol

Kunwar Pal, Divya Bansal

Abstract


In this paper we are presenting the simulation analysis of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network. The security scheme provides the security in two parts in which the hash chain or the encryption algorithm is used. For protecting the TC message we are using the HASH chain and for the hello message encryption algorithm is used. The approach provides the better security than the existing OLSR. And the simulation results show that the approach is more secure and efficient than the real OLSR in case of attacker node. And the SOLSR provides the more security in the case of malicious activities in the network. The security scheme provides the, node to node authentication as well as sender to receiver authentication. The security scheme is so easy, so easily can be implemented on the other proactive routing protocols also.

Keywords


OLSR Protocol, HASH Chain, SHA Algorithm, Encryption Algorithm, AES

Full Text:

PDF

References


C´edric Adjih, Daniele Raffo, Paul M¨uhlethaler INRIA, Domaine de Voluceau, “Attacks Against OLSR: Distributed Key Management for Security” France, 2006.

INTERNET-DRAFT draft-ietf-manet-OLSR-11.txt ”Optimized Link State Routing”, 03 July 2003.

Andreas Tonnesen ,”Impementing and extending the Optimized Link State Routing Protocol”, Unik University Graduate Center University of Oslo , August 1st, 2004.

Cédric Adjih, Thomas Clausen, Anis Laouiti, Paul Muhlethaler, Daniele Raffo “Securing the OLSR routing protocol with or without compromised nodes in the network”,2005.

Amanpreet Kaur, Gurpreet Kaur Deol ,”Secure Optimized Link State Routing Protocol”.2006.

Draft-ietf-manet-OLSRv2-11 “The Optimized Link State Routing Protocol version 2”, April 20, 2010.

Ulrich Herberg and Thomas Clausen “Security issues in the optimized link state routing protocol version 2“, 2010.

Andreas Hafslund, Andreas Tonnesen, Roar Bjorgum Rotvik, Jon Andersson and Oivind Kure, “Secure Extension to the OLSR protocol,” OLSR Interop and Workshop, 2004

A. M. Hegland, P. Spilling, L. Nilsen and Q.Kure , “Hybrid Protection of OLSR”, Electronic Notes in Theoretical Computer Science, 2006.

S. A. Ade1and P.A. Tijare, “Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks”. International Journal of Information Technology and Knowledge Management July-December 2010

PO-WAH YAU, SHENGLAN HU and CHRIS J. MITCHELL, “Malicious attacks on ad hoc network routing protocols”, 2005.

Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks” International Journal of Computer Science and Security.

Shalini Jain, Dr.Satbir Jain. “Detection and prevention of wormhole attack in mobile Adhoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.