Volume 4, No. 2, February 2013
Journal of Global Research in Computer Science
RESEARCH PAPER
Available Online at www.jgrcs.info
© JGRCS 2010, All Rights Reserved 25
DETECTION AND PREVENTION ROUTING MISBEHAVIOUR IN OLSR
ROUTING
Anita Namdev
1
, Vineet Richhariya
2
, Vivek Richhariya
3
1
M.Tech Scholar, Software Engineering, Laxmi Narayan College of Technology, Bhopal (M.P.) India
anitanamdev0103@gmail.com
2
Professor & HOD of Computer Science & Engineering, LNCT, Bhopal (M.P.) India
vineet_rich@yahoo.com
3
Asstt. Professor of Computer Science & Engineering, LNCT, Bhopal (M.P.) India
vivekrich@yahoo.com
Abstract- Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue
of that topology management of network because each node freely moves, in our simulation we use OLSR (optimal link state routing) that
provide MANET route request flood and maintenance of routing but one is the measure challenge is security issue in mobile ad-hoc network, in
this paper we proposed intrusion prevention system that protect the network through routing misbehaviour as well as congestion attack or denial
of service attack, here we simulate the behaviour of normal OLSR routing , Un-trusted network and prevention system after that we conclude our
prevention system provide more secure and reliable communication and increases data delivery ratio.
In this method we analyze the behaviour of network through network simulator-2 and get result of the network.
Keywords- Routing Load, Packet Delivery Ratio, attack, OLSR, congestion.
INTRODUCTION
Mobile ad hoc networks (MANETs) represent complex
distributed systems that comprise wireless mobile nodes that
can freely and dynamically self-organize into arbitrary and
temporary, „„ad-hoc‟‟ network topologies, allowing people
and devices to seamlessly internetwork in areas with no pre-
existing communication infrastructure, e.g., disaster
recovery environments. Ad hoc networking concept is not a
new one, having been around in various forms for over 20
years. Traditionally, tactical networks have been the only
communication networking application that followed the ad
hoc paradigm. Recently, the introduction of new
technologies such as the Bluetooth, IEEE 802.11 and Hyper
LAN are helping enable eventual commercial MANET
deployments outside the military domain. These recent
evolutions have been generating a renewed and growing
interest in the research and development of MANET [8].
An ad hoc network can be formed on-the-fly and
spontaneously without the required intervention of a
centralised access point or an existing infrastructure [9].
The nature of ad hoc networks poses a great challenge to
system security designers due to the following reasons:
firstly, the wireless network is more susceptible to attacks
ranging from passive eavesdropping to active interfering;
secondly, the lack of an online CA or Trusted Third Party
adds the difficulty to deploy security mechanisms; thirdly,
mobile devices tend to have limited power consumption and
computation capabilities which makes it more vulnerable to
Denial of Service attacks and incapable to execute
computation-heavy algorithms like public key algorithms;
fourthly, in MANETs, there are more probabilities for
trusted node being compromised and then being used by
adversary to launch attacks on networks, in another word,
we need to consider both insider attacks and outsider attacks
in mobile ad hoc networks, in which insider attacks are more
difficult to deal with; finally, node mobility enforces
frequent networking reconfiguration which creates more
chances for attacks, for example, it is difficult to distinguish
between stale routing information and faked routing
information.
There are five main security services for MANETs:
authentication, confidentiality, integrity, non-repudiation,
availability. Authentication means that correct identity is
known to communicating partner; Confidentiality means
certain message information is kept secure from
unauthorized party; integrity means message is unaltered
during the communication; non-repudiation means the
origin of a message cannot deny having sent the message;
availability means the normal service provision in face of all
kinds of attacks. Among all the security services,
authentication is probably the most complex and important
issue in MANETs since it is the bootstrap of the whole
security system. Without knowing exactly who you are
talking with, it is worthless to protect your data from being
read or altered. Once authentication is achieved in MANET,
confidentiality is a matter of encrypting the session using
whatever key material the communicating party agrees on.
Note that these security services may be provided singly or
in combination [10-11].
RELATED WORK
Here we are presenting survey about existing work done in
the field of MANET security.
Lalith Suresh P.1, Rajbir Kaur et al. in his work titled
“Collusion Attack Resistance Through Forced MPR
Switching in OLSR” [2] In this work, they propose a novel
attack resistant method named Forced MPR Switching