Volume 4, No. 2, February 2013 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info © JGRCS 2010, All Rights Reserved 25 DETECTION AND PREVENTION ROUTING MISBEHAVIOUR IN OLSR ROUTING Anita Namdev 1 , Vineet Richhariya 2 , Vivek Richhariya 3 1 M.Tech Scholar, Software Engineering, Laxmi Narayan College of Technology, Bhopal (M.P.) India anitanamdev0103@gmail.com 2 Professor & HOD of Computer Science & Engineering, LNCT, Bhopal (M.P.) India vineet_rich@yahoo.com 3 Asstt. Professor of Computer Science & Engineering, LNCT, Bhopal (M.P.) India vivekrich@yahoo.com Abstract- Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue of that topology management of network because each node freely moves, in our simulation we use OLSR (optimal link state routing) that provide MANET route request flood and maintenance of routing but one is the measure challenge is security issue in mobile ad-hoc network, in this paper we proposed intrusion prevention system that protect the network through routing misbehaviour as well as congestion attack or denial of service attack, here we simulate the behaviour of normal OLSR routing , Un-trusted network and prevention system after that we conclude our prevention system provide more secure and reliable communication and increases data delivery ratio. In this method we analyze the behaviour of network through network simulator-2 and get result of the network. Keywords- Routing Load, Packet Delivery Ratio, attack, OLSR, congestion. INTRODUCTION Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, „„ad-hoc‟‟ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre- existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyper LAN are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET [8]. An ad hoc network can be formed on-the-fly and spontaneously without the required intervention of a centralised access point or an existing infrastructure [9]. The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering; secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and then being used by adversary to launch attacks on networks, in another word, we need to consider both insider attacks and outsider attacks in mobile ad hoc networks, in which insider attacks are more difficult to deal with; finally, node mobility enforces frequent networking reconfiguration which creates more chances for attacks, for example, it is difficult to distinguish between stale routing information and faked routing information. There are five main security services for MANETs: authentication, confidentiality, integrity, non-repudiation, availability. Authentication means that correct identity is known to communicating partner; Confidentiality means certain message information is kept secure from unauthorized party; integrity means message is unaltered during the communication; non-repudiation means the origin of a message cannot deny having sent the message; availability means the normal service provision in face of all kinds of attacks. Among all the security services, authentication is probably the most complex and important issue in MANETs since it is the bootstrap of the whole security system. Without knowing exactly who you are talking with, it is worthless to protect your data from being read or altered. Once authentication is achieved in MANET, confidentiality is a matter of encrypting the session using whatever key material the communicating party agrees on. Note that these security services may be provided singly or in combination [10-11]. RELATED WORK Here we are presenting survey about existing work done in the field of MANET security. Lalith Suresh P.1, Rajbir Kaur et al. in his work titled Collusion Attack Resistance Through Forced MPR Switching in OLSR” [2] In this work, they propose a novel attack resistant method named Forced MPR Switching