Open Access   Article Go Back

Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network

Madgula Vijaya Bhaskar1 , G.A. Ramachandra2 , Y. Deepika3

  1. Department of Computer Science & Engineering, Rayalaseema University, India.
  2. Department of Computer Science, S.K. University, India.
  3. Government Polytechnic, Dharmavaram.

Correspondence should be addressed to: vijaya.bhaskar2010@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 232-241, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.232241

Online published on Nov 30, 2017

Copyright © Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika, “Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.232-241, 2017.

MLA Style Citation: Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika "Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network." International Journal of Computer Sciences and Engineering 5.11 (2017): 232-241.

APA Style Citation: Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika, (2017). Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network. International Journal of Computer Sciences and Engineering, 5(11), 232-241.

BibTex Style Citation:
@article{Bhaskar_2017,
author = {Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika},
title = {Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2017},
volume = {5},
Issue = {11},
month = {11},
year = {2017},
issn = {2347-2693},
pages = {232-241},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1571},
doi = {https://doi.org/10.26438/ijcse/v5i11.232241}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i11.232241}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1571
TI - Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - Madgula Vijaya Bhaskar, G.A. Ramachandra, Y. Deepika
PY - 2017
DA - 2017/11/30
PB - IJCSE, Indore, INDIA
SP - 232-241
IS - 11
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
1038 375 downloads 320 downloads
  
  
           

Abstract

Without the dependence of any infrastructure or central administration to create a temporary network that includes a group of nodes and wireless hosts called as the Adhoc Mobile Network (MANET). Where multipath routing in MANET has been used primarily to transmit data without interruption. Everywhere, the routing technique is primarily considered to ensure the transmission of the message while being used in some protocols. But transmission security is one of the main disadvantages of this network. Therefore, use Secure Multipath Optimized Link State Routing Protocol (SMOLSR), which is a proactive approach to routing protocol-controlled tables, to improve efficiency, which primarily depends on multipoint relay selection (MPR). A new routing protocol for MANET is the progress of the OLSR, which integrates the multi-route strategy and the source routing control scheme. In this protocol, a Dijkstra adaptive algorithm (ADA) has been developed to estimate short-time path based multipath routing and create a control node using the hop in hop authentication model through the bidirectional authentication process (TWA). Initially, find a more limited path using the Dijkstra calculation to create a duplicate topology. In this way, delete the inner and third centers, look for a second more limited path using the Dijkstra calculation. This methodology is called a multi-Dijkstra algorithm. The main objective of the research work defining the quality of the link and the selection of the paths. The TWA process is performed for security to effectively transmit the message. If an interrupt occurs in the source-destination path, it automatically confirms the route to deliver the end-user message without loss of data. The transmitted message is well protected by a TWA process. The performance of the proposed SMOLSR protocol is compared with the many traditional protocols such as OLSR, AOMDV and CA-AOMDV. As a result, the results of the proposed SMOLSR protocol have surpassed that of other protocols.

Key-Words / Index Term

Multi-Point Relay (MPR), Two Way Authentication (TWA), Adaptive Dijkstra Algorithm (ADA)

References

[1] D. S. Dhenakaran and A. Parvathavarthini, "An overview of routing protocols in mobile ad-hoc network," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, 2013.
[2] P. Periyasamy and E. Karthikeyan, "Survey of current multipath routing protocols for mobile ad hoc networks," International Journal of Computer Network and Information Security, vol. 5, p. 68, 2013.
[3] H. Kaur, V. Sahni, and M. Bala, "A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review," network, vol. 4, pp. 498-500, 2013.
[4] M. Marimuthu and I. Krishnamurthi, "Enhanced OLSR for defense against DOS attack in ad hoc networks," journal of communications and networks, vol. 15, pp. 31-37, 2013.
[5] D. Natarajan and A. P. Rajendran, "AOLSR: hybrid ad hoc routing protocol based on a modified Dijkstra`s algorithm," EURASIP Journal on Wireless Communications and Networking, vol. 2014, p. 90, 2014.
[6] E. S. A. Ganie and M. N. Sharma, "Interference-Aware and Fault Tolerant Multipath Routing Protocols for Mobile Ad Hoc Networks," International Journal of Engineering Science, vol. 2524, 2016.
[7] C. B. Dutta and U. Biswas, "A novel blackhole attack for multipath AODV and its mitigation," in Recent Advances and Innovations in Engineering (ICRAIE), 2014, 2014, pp. 1-6.
[8] Vipul Kumar, Musheer Vaqar, "BLACK HOLE Attack: A New Detection Technique", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.63-67, 2016.
[9] K. Somasundaram, "An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet," Indian Journal of Science and Technology, vol. 9, 2016.
[10] P. Pavithra, "Averting Techniques of Black-Hole Attack–A Survey," Indian Journal of Science and Technology, vol. 9, 2016.
[11] M. S. A. A. Mahmood, D. T. M. Hasan, and M. S. D. S. Ibrahim, "Modified AODV routing protocol to detect the black hole attack in MANET," International Journal, vol. 5, 2015.
[12] R. Ahlawat and S. K. Chaturvedi, "A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET," International Journal of Computer Applications, vol. 80, 2013.
[13] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[14] M. K. P. Dubey and E. K. Barua, "A Review-Techniques to Mitigate Black/Gray Hole Attacks in MANET," Engineering Universe for Scientific Research and Management (EUSRM) Volume, vol. 6, 2014.
[15] C. She, P. Yi, J. Wang, and H. Yang, "Intrusion Detection for Black Hole and Gray Hole in MANETs," TIIS, vol. 7, pp. 1721-1736, 2013.
[16] S. Mandala, M. A. Ngadi, J. M. Sharif, M. S. M. Zahid, and F. Mohamed, "Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks," International Journal of Embedded Systems, vol. 7, pp. 296-305, 2015.
[17] A. Adnane, C. Bidan, and R. T. de Sousa Júnior, "Trust-based security for the OLSR routing protocol," Computer Communications, vol. 36, pp. 1159-1171, 2013.
[18] Vinita keer and Syed Imran Ali, "A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.54-58, 2016.
[19] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013
[20] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[21] S. Ali, S. A. Madani, and I. A. Khan, "Routing protocols for mobile sensor networks: A comparative study," arXiv preprint arXiv:1403.3162, 2014.
[22] R. K. Gujral, J. Grover, A. Anjali, and S. Rana, "Impact of transmission range and mobility on routing protocols over ad hoc networks," in Computing Sciences (ICCS), 2012 International Conference on, 2012, pp. 201-206.
[23] A. S. Otero and M. Atiquzzaman, "Adaptive localized active route maintenance mechanism to improve performance of voIP over ad hoc networks," 2011.
[24] A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, "Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function," IEEE Access, vol. 5, pp. 10369-10381, 2017.