Performance Evaluation of Secure OLSR under Link Spoofing Attack
| dc.contributor.author | Aditi | |
| dc.contributor.supervisor | Mishra, Ashutosh | |
| dc.date.accessioned | 2016-08-10T07:13:48Z | |
| dc.date.available | 2016-08-10T07:13:48Z | |
| dc.date.issued | 2016-08-10 | |
| dc.description.abstract | Mobile ad hoc network (MANET) is a dynamic in nature which is constantly prone to many severe attacks. It has a many unique features unlike conventional network. It is a node resource constraint and self-constructed network. In this thesis, we summarized basically security vulnerabilities in the optimized link state routing protocol (OLSR). OLSR is mostly primarily for dense networks. The paramount feature of OLSR is multipoint relay nodes. In our work, we suggested a prototype to defend against link spoofing attack. Our main technique is based on interchanging control packets by 2-hop neighbors. The major ease of our approach is that it offers protection against link spoofing attack without having knowledge of complete scenario. In our scenario we do not need particular hardware like Global Positioning System (GPS). Secure-OLSR is implemented on network simulator. Our simulation analysis indicates that proposed algorithm is good enough to detect presence of malicious node under link spoofing attack as compared to current version of OLSR. Our approach have higher packet delivery ratio, and throughput. | en_US |
| dc.identifier.uri | http://hdl.handle.net/10266/4054 | |
| dc.language.iso | en | en_US |
| dc.subject | MANET | en_US |
| dc.subject | OLSR | en_US |
| dc.subject | Routing | en_US |
| dc.subject | Vulnerabilities | en_US |
| dc.title | Performance Evaluation of Secure OLSR under Link Spoofing Attack | en_US |
| dc.type | Thesis | en_US |
