DocumentCode
561298
Title
Performance assessment of OLSR protocol under routing attacks
Author
Salehi, Mahmood ; Samavati, Hamed ; Dehghan, Mehdi
Author_Institution
Karaj Branch, Sama Tech. & Vocational Training Coll., Islamic Azad Univ., Karaj, Iran
fYear
2011
fDate
11-14 Dec. 2011
Firstpage
791
Lastpage
796
Abstract
Routing is one of the most important challenges regarding mobile ad hoc networks (MANETs). Having no fixed infrastructure along with frequent network topology changes, as a result of nodes mobility, necessitate routing protocols to operate under cooperation of all network nodes. Lack of cooperation in routing can lead to performance reduction and even network denial of service. Uncooperative behavior of nodes can be performed selfishly by refraining from forwarding data packets or, in a more advanced class, maliciously in the form of an attack against the network. One of the most famous, challenging, and destructive routing attacks in MANETs, which can dramatically reduce network performance, is known as Black-hole attack. Black hole attack operates based upon two different phases. The first phase consists of absorbing a considerable amount of network traffic towards attacker node, and the second one is dropping received data packets. In optimized link state routing (OLSR) protocol, a well-known proactive routing algorithm for MANETs, Black hole attack can be implemented in different methods. The objective of this paper is to evaluate effects of different Black hole implementations as well as various selfish behaviors on OLSR based MANETs. Assessment of network parameters has been carried out using Network Simulator (NS-2). Simulation results represent that a special implementation of Black hole attack, which is named as TC-HELLO-Black-Hole and considered in this paper for the first time, is more devastating compared to other implementations and selfish nodes. Furthermore, such attack lessens routing overhead compared to basic OLSR.
Keywords
mobile ad hoc networks; routing protocols; telecommunication network topology; telecommunication traffic; MANET; NS-2; OLSR protocol; TC-HELLO-Black-Hole; black-hole attack; data packets; destructive routing attacks; mobile ad hoc networks; network simulator; network topology; network traffic; optimized link state routing protocol; proactive routing algorithm; Ad hoc networks; Delay; Mobile computing; Network topology; Routing; Routing protocols; Black hole Attack; Mobile Ad hoc Network; OLSR; Selfish Node;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
Conference_Location
Abu Dhabi
Print_ISBN
978-1-4577-0884-8
Type
conf
Filename
6148439
Link To Document