Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

0
399
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

Abstract

A focus on routing protocols for Mobile Ad-Hoc Networks (MANET) aimed at routing efficiency, The resulting protocols tend to be vulnerable to different attacks.The resulting protocols tend to be vulnerable to different attacks.Different solutions have been proposed for different types of attacks,but these solutions often compromise routing efficiency or network overload.

Introduction

Mitigating Denial of Service Attacks A Mobile Ad Hoc Network (MANET) is a group of mobile devices that can communicate wirelessly with each other without using a predefined infrastructure or centralized authority.

Projects reports on Mitigating Denial The sending of packets from one device to another is done via a chain of intermediate nodes.There are a number of different routing algorithms available for network packet transmission.

Conclusion

Projects on Mitigating Denial of Service Attacks We presented a solution called DCFM with the function of preventing a node isolation attack in which the attacker manipulates the victim to designate the attacker as the sole MPR, giving the attacker control over the communication channel.

Projects on Mitigating Denial of Service Attacks Simulation shows that DCFM successfully prevents the attack, especially in the realistic scenario in which all nodes in the network are mobile. Furthermore, it was discovered that the closer DCFM overhead is to OLSR as node population increases in density and size.

Since OLSR works best in dense large networks, DCFM can work without any real additional cost.