Security Against Spoofing Attack Using SOLSR Protocol

Download Now
Provided by: International Journal for Technological Research in Engineering (IJTRE)
Topic: Networking
Format: PDF
MANET (Mobile Ad-hoc NETwork) has become successful in grabbing the eyeballs of many researchers in networking area. Among the different routing protocols OLSR (Optimized Link Source Routing) assumes that all the nodes in the network topology are trusted i.e. authenticated. However, in hostile environment OLSR is vulnerable to various kinds of attacks such as spoofing, wormhole attack and colluding misrelay attack. Among different schemes such as hybrid protection of OLSR, signature scheme, Secure OLSR (SOLSR), the authors have implemented SOLSR. Using hash (along with ceaser cipher encryption) they check the authenticity of nodes and thereby detect and recover spoofing attack.
Download Now

Find By Topic