Open Access   Article Go Back

Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks

Himani Bali1 , Naveen Hemrajani2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 239-242, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.239242

Online published on Jun 30, 2018

Copyright © Himani Bali, Naveen Hemrajani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Himani Bali, Naveen Hemrajani, “Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.239-242, 2018.

MLA Style Citation: Himani Bali, Naveen Hemrajani "Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 6.6 (2018): 239-242.

APA Style Citation: Himani Bali, Naveen Hemrajani, (2018). Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 6(6), 239-242.

BibTex Style Citation:
@article{Bali_2018,
author = {Himani Bali, Naveen Hemrajani},
title = {Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {239-242},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2170},
doi = {https://doi.org/10.26438/ijcse/v6i6.239242}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.239242}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2170
TI - Analysis of Attacks against Optimized Link State Routing Protocol -based Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Himani Bali, Naveen Hemrajani
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 239-242
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
556 383 downloads 317 downloads
  
  
           

Abstract

Mobile Adhoc Networks are vulnerable to attacks due to its dynamic topology. All attacks, blackhole, dropping attack and flooding are analyzed and implemented against Optimized Link State Routing Protocol on Network Simulator-3. The results clearly show how attacks could rigorously affect communication and, the need for security solutions for such highly dynamic networks.

Key-Words / Index Term

Mobile Adhoc Networks, Optimized Link State Routing Protocol, Attacks, Blackhole, Dropping , Flooding

References

[1] R. D. Pietro, S. Guarino, N. Verde, and J. Domingo-Ferrer, “Security in wireless ad-hoc networks a survey,” Computer Communications, vol. 51, pp. 1 – 20, 2014.
[2] E. F. Ahmed, R. A. Abouhogail, and A. Yahya, "Performance evaluation of blackhole attack on vanet`s routing protocols," International Journal of Software Engineering and Its Applications, vol. 8, no. 9, pp. 39 – 54, 2014.
[3] P. Yi, Z. Dai, S. Zhang, and Y. Zhong, “A new routing attack in mobile ad hoc networks,” International Journal of Information Technology, vol. 11, no. 2, pp. 83–94, 2005.
[4] Bounpadith Kannhavong, Hidehisa Nakayama, Abbas Jamalipour “Analysis of the Dropping Attack Against OLSR-based Mobile Ad Hoc Networks” Proc. 7th IEEE International Symposium on Computer Network, pp 30-35,2006.
[5] Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharm, “A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks” Paper published in Journal of Computing, { ISSN-2151-9617}, pp. 41-48, January 2011.
[6] K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
[7] G.A. Pegueno and J. R. Rivera, “Extension to MAC 802.11 for performance Improvement in MANET”, Karlstads University, Sweden, December 2006.
[8] Ankur Thakur and Anuj Gupta, “Black Hole Problem with OLSR Protocol in MANETs”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 4. Pp, 1-4, Sept 2014.
[9] R.Kumari, P. Nand, “Performance Analysis of existing Routing Protocols” International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE), ISSN-2320-7639, Vol. 5 No. 5, October-2017.
[10] R. Kumari, P. Nand , “ Performance analysis for MANETs using certain realistic mobility models:NS-2”,International Journal of Scientific Research in Computer Science and Engineering (IJSRCSE),Vol.6, Issue.1 , pp.70-77, Feb-2018.
[11] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "A Novel Security Based Model for Wireless Mesh Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.11-15, 2013.