IJRE – Volume 5 Issue 4 Paper 4

ROUTING PATH INTRUSION NODE REMOVAL USING OLSR PROTOCOL

Author’s Name :  J kalidevi | A Wims Magdalene mary

Volume 05 Issue 04  Year 2018  ISSN No:  2349-252X  Page no: 14-16

12

 

 

 

Abstract:

The open nature of the suspicious node of the adhoc network leaves it vulnerable to packet loss through link error and packet dropping. The mitigating technique can be used for mounting the packet loss on the wireless adhoc network. Typically, the detection process has been addressed under insider attack cases. Many existing works has carried out to answer these issues but reputation of the system fails due to manipulation of the data. Data integrity plays major problem in the reputation of the system against the data modification attacks. In this paper, we propose an attack resilient technique named as MANET. The MANETs does not have any fixed infrastructure or central access points to the backbone infrastructure to the sensitive information. The OLSR protocol is proactive to the reputation base mechanism to prevent the attacks.

Keywords:

MANET, OLSR Protocol, Packet Hiding, Routing Path

References:

  1. L. Lazos, S. Liu, and M. Krunz, “Mitigating Control-Channel Jamming Attacks in Multi- Channel Ad Hoc Networks,” Proc.Second ACM Conf. Wireless Network Security, pp. 169-180, 2009.
  2. G. Lin and G. Noubir, “On Link Layer Denial of Service in Data Wireless LANs,” Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp. 273-284, May 2004.
  3. S. Buchegger and J.-Y.LeBoudee, “Self- policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107, Jul. 2005.
  4. E. Hern_andez-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate, and P. Manzoni, “Improving selfish node detection in MANETs using a collaborative watchdog,” IEEE Comm. Lett., vol. 16, no. 5,pp. 642–645, May 2012.
  5. Meixing Le, AngelosStavrou, Brent ByungHoon Kang, “Double Guard: Detecting Intrusions in Multitier Web Applications” IEEE Transaction on Department and Secure Computing, Vol 9, No. 4, JULY/AUGUST 2012
  6. R. Rao and G. Kesidis, “Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited,” in Proc. IEEE GLOBECOMConf., 2003, pp. 2957–2961.
  7. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255–265.
  8. K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement- based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2006.
  9. Y. Liu and Y. R. Yang, “Reputation propagation and agreement in mobile ad-hoc networks,” in Proc. IEEE WCNC Conf., 2003, pp. 1510–1515.
  10. W. Galuba, P. Papadimitratos, M. Poturalski, K. Aberer, Z. Despotovic, and W. Kellerer, “Castor: Scalable secure routing for ad hoc networks,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1 –9.
  11. K. Balakrishnan, J. Deng, and P. K. Varshney, “TWOACK: Preventing selfishness in mobile ad hoc networks,” in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp. 2137–2142.
  12. K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowledgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
  13. K. Vishnu and A. J Paul, “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks,” Int. J. Comput. Appl., vol. 1, no. 22, pp. 28–32, 2010.
  14. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of cooperative blackhole attacks in wireless ad hoc networks,” in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570–575.
  15. H. Weerasinghe and H. Fu, “Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation,” in Proc. IEEE ICC, 2007, pp. 362– 367.