![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Simulation Analysis of Secure OLSR Routing Protocol
Subscribe/Renew Journal
In this paper we are presenting the simulation analysis of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network. The security scheme provides the security in two parts in which the hash chain or the encryption algorithm is used. For protecting the TC message we are using the HASH chain and for the hello message encryption algorithm is used. The approach provides the better security than the existing OLSR. And the simulation results show that the approach is more secure and efficient than the real OLSR in case of attacker node. And the SOLSR provides the more security in the case of malicious activities in the network. The security scheme provides the, node to node authentication as well as sender to receiver authentication. The security scheme is so easy, so easily can be implemented on the other proactive routing protocols also.
Keywords
OLSR Protocol, HASH Chain, SHA Algorithm, Encryption Algorithm, AES.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 254
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 3