Visible to the public Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm

TitlePrevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Publication TypeConference Paper
Year of Publication2017
AuthorsBhuvaneswari, R., Ramachandran, R.
Conference Name2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)
ISBN Number978-1-5090-3378-2
Keywordsattack prevention, compositionality, DCFM, Denial Contradictions, denial of service attack, DoS, DoS attacks, ECC algorithm, Elliptic curve cryptography, Fictitious Node Mechanism, formal routing, MANET, MANET routing protocol, Metrics, mobile ad hoc networks, network layer attacks, OLSR, OLSR protocol, Optimized Link State Routing protocol, pubcrawl, resilience, Resiliency, Routing, Routing protocols, selective flooding technique, telecommunication security, virtual node, Wireless sensor networks, WSN

Security is the most important issue which needs to be given utmost importance and as both `Mobile Ad hoc Networks (MANET) and Wireless Sensor Networks (WSN) have similar system models, their security issues are also similar. This study deals in analysing the various lapses in security and the characteristics of various routing protocol's functionality and structure. This paper presents the implementation of ECC algorithm in the prevention of Denial of Service (DoS) attack through fictitious node. Optimized Link State Routing (OLSR) protocol is a MANET routing protocol and is evaluated mainly for two things. Primarily OLSR is less secure like AODV and others. The reason for it being less secure is that it is a table-driven in nature and uses a methodology called selective flooding technique, where redundancy is reduced and thus the security possibilities of the protocol is reduced. Another reason for selecting OLSR is that is an highly effective routing protocol for MANET. A brief information about formal routing is provided by the proposed methodology termed Denial Contradictions with Fictitious Node Mechanism (DCFM) which provides brief information about formal routing. Here, fictitious node acts as a virtual node and large networks are managed from attacks. More than 95% of attacks are prevented by this proposed methodology and the solution is applicable all the other DoS attacks of MANET.

Citation Keybhuvaneswari_prevention_2017