Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks
Himani Bali1 , Naveen Hemrajani2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 239-242, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.239242
Online published on Jun 30, 2018
Copyright © Himani Bali, Naveen Hemrajani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Himani Bali, Naveen Hemrajani, “Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.239-242, 2018.
MLA Style Citation: Himani Bali, Naveen Hemrajani "Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 6.6 (2018): 239-242.
APA Style Citation: Himani Bali, Naveen Hemrajani, (2018). Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 6(6), 239-242.
BibTex Style Citation:
@article{Bali_2018,
author = {Himani Bali, Naveen Hemrajani},
title = {Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {239-242},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2170},
doi = {https://doi.org/10.26438/ijcse/v6i6.239242}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.239242}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2170
TI - Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Himani Bali, Naveen Hemrajani
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 239-242
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
556 | 383 downloads | 317 downloads |
Abstract
Mobile Adhoc Networks are vulnerable to attacks due to its dynamic topology. All attacks, blackhole, dropping attack and flooding are analyzed and implemented against Optimized Link State Routing Protocol on Network Simulator-3. The results clearly show how attacks could rigorously affect communication and, the need for security solutions for such highly dynamic networks.
Key-Words / Index Term
Mobile Adhoc Networks, Optimized Link State Routing Protocol, Attacks, Blackhole, Dropping , Flooding
References
[1] R. D. Pietro, S. Guarino, N. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks a survey,” Computer Communications, vol. 51, pp. 1 – 20, 2014.
[2] E. F. Ahmed, R. A. Abouhogail, and A. Yahya, "Performance evaluation of blackhole attack on vanet`s routing protocols," International Journal of Software Engineering and Its Applications, vol. 8, no. 9, pp. 39 – 54, 2014.
[3] P. Yi, Z. Dai, S. Zhang, and Y. Zhong, “A new routing attack in mobile ad hoc networks,” International Journal of Information Technology, vol. 11, no. 2, pp. 83–94, 2005.
[4] Bounpadith Kannhavong, Hidehisa Nakayama, Abbas Jamalipour “Analysis of the Dropping Attack Against OLSR-based Mobile Ad Hoc Networks” Proc. 7th IEEE International Symposium on Computer Network, pp 30-35,2006.
[5] Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharm, “A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks” Paper published in Journal of Computing, { ISSN-2151-9617}, pp. 41-48, January 2011.
[6] K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
[7] G.A. Pegueno and J. R. Rivera, “Extension to MAC 802.11 for performance Improvement in MANET”, Karlstads University, Sweden, December 2006.
[8] Ankur Thakur and Anuj Gupta, “Black Hole Problem with OLSR Protocol in MANETs”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 4. Pp, 1-4, Sept 2014.
[9] R.Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.
[10] R. Kumari, P. Nand , “ Performance analysis for MANETs using certain realistic mobility models:NS-2”,International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE),Vol.6, Issue.1 , pp.70-77, Feb-2018.
[11] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "A Novel Security Based Model for Wireless Mesh Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.11-15, 2013.