Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Simulation Analysis of Secure OLSR Routing Protocol


Affiliations
1 Department of Computer Science and Engineering, PEC, University of Technology, India
     

   Subscribe/Renew Journal


In this paper we are presenting the simulation analysis of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network. The security scheme provides the security in two parts in which the hash chain or the encryption algorithm is used. For protecting the TC message we are using the HASH chain and for the hello message encryption algorithm is used. The approach provides the better security than the existing OLSR. And the simulation results show that the approach is more secure and efficient than the real OLSR in case of attacker node. And the SOLSR provides the more security in the case of malicious activities in the network. The security scheme provides the, node to node authentication as well as sender to receiver authentication. The security scheme is so easy, so easily can be implemented on the other proactive routing protocols also.

Keywords

OLSR Protocol, HASH Chain, SHA Algorithm, Encryption Algorithm, AES.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 254

PDF Views: 3




  • Simulation Analysis of Secure OLSR Routing Protocol

Abstract Views: 254  |  PDF Views: 3

Authors

Kunwar Pal
Department of Computer Science and Engineering, PEC, University of Technology, India
Divya Bansal
Department of Computer Science and Engineering, PEC, University of Technology, India

Abstract


In this paper we are presenting the simulation analysis of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network. The security scheme provides the security in two parts in which the hash chain or the encryption algorithm is used. For protecting the TC message we are using the HASH chain and for the hello message encryption algorithm is used. The approach provides the better security than the existing OLSR. And the simulation results show that the approach is more secure and efficient than the real OLSR in case of attacker node. And the SOLSR provides the more security in the case of malicious activities in the network. The security scheme provides the, node to node authentication as well as sender to receiver authentication. The security scheme is so easy, so easily can be implemented on the other proactive routing protocols also.

Keywords


OLSR Protocol, HASH Chain, SHA Algorithm, Encryption Algorithm, AES.