A Novel Approach for the Monitor and Detection of Node Isolation Attack in WANETs

  • Linny SunnyEmail author
  • T. K. Ratheesh
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


Optimized Link State Routing protocol (OLSR) is a most predominant proactive routing protocol used to exchange the routing information. Each node in the network select a subset of its 1 hop neighbors known as Multi Point Relays (MPR) which reduces the redundant retransmissions. The selection of MPR in OLSR protocol for data exchange is prone to node isolation attack. We propose a system suitable for securing the OLSR protocol from node isolation attack. The proposed system considers two aspects of node isolation attack - monitor and detection. Monitoring deals with applying appropriate contradiction rules and fictitious setting mechanism to reduce the performance of an attacker to act as an MPR. Detection deals with a method for detecting the attack that occurs bypassing the monitoring mechanism and it aids to know the chances for the attacker to act as an MPR through the beacon signal mechanism. The performance evaluation shows that the system monitors more than 95% of the attack. A decrease in the overhead as the network size increases is also observed from the calculation of Average MPR, Average TC, and Average PDR.


Multipoint relay Optimized link state protocol Node isolation attack Contradiction rules 


  1. 1.
    Corson, S., Macker, J.: Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. In: IETF RFC 2501 (1999)Google Scholar
  2. 2.
    Clausen, T., Jacquet, P.: IETF RFC3626: optimized link state routing protocol (OLSR). In: Experimental (2003)Google Scholar
  3. 3.
    Moudgil, S., Rana, S.: A secure & robust scheme to isolate DDoS attacks over MANET. Int. J. Comput. Sci. Issues 13(3), 31 (2016)CrossRefGoogle Scholar
  4. 4.
    Kurosawa, S., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: Detecting black-hole attack on AODV-based mobile ad hoc networks by dynamic learning method. In: Proceeding of International Journal of Network Security (2006)Google Scholar
  5. 5.
    Kannhavong, B., Nakayama, H., Jamalipour, A.: A study of routing attack in OLSR-based mobile ad hoc networks. Int. J. Commun. Syst. 20, 1245–1261 (2007)CrossRefGoogle Scholar
  6. 6.
    Hu, Y.-C., Perrig, A., Johnson, D.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRefGoogle Scholar
  7. 7.
    Malik, D., Mahajan, K., Rizvi, M.A.: Security for node isolation attack on OLSR by modifying MPR selection process. In: First International Conference on Networks & Soft Computing (ICNSC 2014) (2014)Google Scholar
  8. 8.
    Sahu, Y., Rizvi, M.A., Kapoor, R.K.: Intruder detection mechanism against DoS attack on OLSR. In: International Conference on Eco-Friendly Computing and Communication Systems (ICECCS) (2016)Google Scholar
  9. 9.
    Raffo, D., Adjih, C., Clausen, T., Muhlethaler, P.: An advanced signature system for OLSR. In: Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), Washington, DC, USA (2004)Google Scholar
  10. 10.
    Gondaliya, T.P., Maninder, S.: Intrusion detection system on MAC layer for attack prevention in MANET. In: Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE (2013)Google Scholar
  11. 11.
    Marimuthu, M., Krishnamurthu, I.: Enhanced OLSR for defense against DOS attack in ad hoc networks. J. Commun. Netw. 15(1), 31–37 (2013)CrossRefGoogle Scholar
  12. 12.
    Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.D.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mobile Comput. 15, 163–172 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Information TechnologyGovernment Engineering College, IdukkiIdukkiIndia

Personalised recommendations