Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Title | Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Bhuvaneswari, R., Ramachandran, R. |
Conference Name | 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) |
ISBN Number | 978-1-5090-3378-2 |
Keywords | attack prevention, compositionality, DCFM, Denial Contradictions, denial of service attack, DoS, DoS attacks, ECC algorithm, Elliptic curve cryptography, Fictitious Node Mechanism, formal routing, MANET, MANET routing protocol, Metrics, mobile ad hoc networks, network layer attacks, OLSR, OLSR protocol, Optimized Link State Routing protocol, pubcrawl, resilience, Resiliency, Routing, Routing protocols, selective flooding technique, telecommunication security, virtual node, Wireless sensor networks, WSN |
Abstract | Security is the most important issue which needs to be given utmost importance and as both `Mobile Ad hoc Networks (MANET) and Wireless Sensor Networks (WSN) have similar system models, their security issues are also similar. This study deals in analysing the various lapses in security and the characteristics of various routing protocol's functionality and structure. This paper presents the implementation of ECC algorithm in the prevention of Denial of Service (DoS) attack through fictitious node. Optimized Link State Routing (OLSR) protocol is a MANET routing protocol and is evaluated mainly for two things. Primarily OLSR is less secure like AODV and others. The reason for it being less secure is that it is a table-driven in nature and uses a methodology called selective flooding technique, where redundancy is reduced and thus the security possibilities of the protocol is reduced. Another reason for selecting OLSR is that is an highly effective routing protocol for MANET. A brief information about formal routing is provided by the proposed methodology termed Denial Contradictions with Fictitious Node Mechanism (DCFM) which provides brief information about formal routing. Here, fictitious node acts as a virtual node and large networks are managed from attacks. More than 95% of attacks are prevented by this proposed methodology and the solution is applicable all the other DoS attacks of MANET. |
URL | https://ieeexplore.ieee.org/document/8186625/ |
DOI | 10.1109/ICAMMAET.2017.8186625 |
Citation Key | bhuvaneswari_prevention_2017 |
- mobile ad hoc networks
- WSN
- wireless sensor networks
- virtual node
- telecommunication security
- selective flooding technique
- Routing protocols
- Routing
- Resiliency
- resilience
- pubcrawl
- Optimized Link State Routing protocol
- OLSR protocol
- OLSR
- network layer attacks
- attack prevention
- Metrics
- MANET routing protocol
- MANET
- formal routing
- Fictitious Node Mechanism
- Elliptic curve cryptography
- ECC algorithm
- DoS attacks
- DoS
- denial of service attack
- Denial Contradictions
- DCFM
- Compositionality