Advertisement

Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol

  • Kamel Saddiki
  • Sofiane Boukli-Hacene
  • Marc Gilg
  • Pascal LorenzEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)

Abstract

The main objective of routing protocol is to discover the route from any source to any destination in the network. For this need the MANET working group defined three categories of routing protocols: reactive protocols such as AODV, proactive protocols such as OLSR, and hybrid ones such as ZRP. OLSR is one of the famous routing protocols in wireless network in which routes are immediately available when needed. The key concept of this protocol is the using of nodes called Multipoint Rely (MPR). The MPR reduces the number of duplicated packets broadcasted in the network. This characteristic can be exploited by a misbehavior node and force selection it as MPR by spoofing links with nodes within the network. In this paper, we present the vulnerability of OLSR protocol versus a smart cooperative misbehaviors nodes. After that, we propose a new optimized scheme called Neighbors-Trust-Based. The main idea is the collaboration between neighbors to detect misbehaviors nodes. We demonstrate the feasibility of our scheme through a detailed simulation using NS2.

Keywords

MANET Routing protocol OLSR MPR Black hole Link spoofing Misbehavior NS2 

References

  1. 1.
    Clausen, T., Jaquet, P.: Optimized link state routing protocol OLSR, IETF Request for Comments: 3626 (2003)Google Scholar
  2. 2.
    Varshney, P.K., et al.: Relative performance analysis of proactive routing protocols in wireless ad hoc networks using varying node density. Invertis J. Sci. Technol. 9(3), 1–9 (2016)CrossRefGoogle Scholar
  3. 3.
    Harjeet, K., Manju B., Varsha S.: Performance evaluation of AODV, OLSR, ZRP protocols under blackhole attack in manet. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 2(6) (2013)Google Scholar
  4. 4.
    Praveen, K.S., Gururaj, H.L., Ramesh, B.: Comparative analysis of black hole attack in ad hoc network using AODV and OLSR protocols. In: International Conference on Computational Modeling and Security (CMS 2016), pp. 325–330 (2016)CrossRefGoogle Scholar
  5. 5.
    Prashar, L., Kapur, R.: Performance analysis of routing protocols under different types of attacks in MANETs. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (2016)Google Scholar
  6. 6.
    Saddiki, K., Boukli-Hacene, S., Lorenz, P., Gilg, M.: Black hole attack detection and ignoring in OLSR protocol. Int. J. Trust Manag. Comput. Commun. 4(1) (2017)Google Scholar
  7. 7.
    Singh, A., Singh, G., Singh, M.: Comparative study of OLSR, DSDV, AODV, DSR and ZRP routing protocols under blackhole attack in mobile ad hoc network. In: Singh, R., Choudhury, S., Gehlot, A. (eds.) Intelligent Communication, Control and Devices. AISC, vol. 624, pp. 443–453. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-5903-2_45CrossRefGoogle Scholar
  8. 8.
    Bhuvaneswari, R., Ramachandran, R.: Denial of service attack solution in OLSR based manet by varying number of fictitious nodes. Cluster Comput., 1–11 (2018)Google Scholar
  9. 9.
    Baadache, A., Belmehdi, A.: Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Comput. Netw. 73, 173–184 (2014)CrossRefGoogle Scholar
  10. 10.
    Semchedine, F., Moussaoui, A., Zouaoui, K., Mehamel, S.: CRY OLSR: crypto optimized link state routing for MANET. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS) (2016)Google Scholar
  11. 11.
    Sahu, Y., Rizvi, M., Kapoor, R.: Intruder detection mechanism against DoS attack on OLSR. In: 2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS) (2016)Google Scholar
  12. 12.
    Abdalla, A., Saroit, I., Kotb, A., Afsari, A.: Misbehavior nodes detection and isolation for MANETs OLSR protocol. Procedia Comput. Sci. 3, 115–121 (2011)CrossRefGoogle Scholar
  13. 13.
    Baiad, R., Alhussein, O., Otrok, H., Muhaidat, S.: Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET. Veh. Commun. 5, 9–17 (2016)Google Scholar
  14. 14.
    Schweitzer, N., Stulman, A., Shabtai, A., Margalit, R.: Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Trans. Mob. Comput. 15(1), 163–172 (2016)CrossRefGoogle Scholar
  15. 15.
    Vanamala, C.K., Raghvendra Rao, G.: Strategic modeling of secure routing decision in OLSR protocol in mobile ad-hoc network. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds.) CSOC 2017. AISC, vol. 575, pp. 201–208. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-57141-6_21CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Kamel Saddiki
    • 1
    • 2
  • Sofiane Boukli-Hacene
    • 2
  • Marc Gilg
    • 1
  • Pascal Lorenz
    • 1
    Email author
  1. 1.Laboratoire Modélisation, Intelligence, Processus et Systèmes (MIPS), EA2332Université de Haute-AlsaceMulhouseFrance
  2. 2.Laboratoire Evolutionary Engineering and Distributed Information Systems (EEDIS)Université de Djilali LiabesSidi Bel AbbesAlgeria

Personalised recommendations