International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 314

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.3 / 10


     

Detecting and Avoiding Sybil Attack in OLSR Protocol

Amit Kumar, Varun Singla


Abstract: The ad hoc network is an infrastructure less wireless network consisting of mobile moving nodes. VANETs is the recently developed technique to achieve traffic safety and efficiency through inter vehicle communication, where routing protocol plays a vital role. Inefficient network security brings the severe degradation in network throughput and performance. Routing throughput and performance is largely dependent on the availability and security of the wireless link which makes it a very pivotal parameter, that cant be ignored in order to obtain proper performance and throughput measurement in VANETs. Secured routing is greatly dependent on the availability, performance and stability of the wireless links, which makes it a vital parameter that shouldnt be neglected in order to obtain proper security measurement in VANET. Many malicious vehicles demean the functioning of network by actuating some attacks So this work presents a refreshing technique that has been put forward to search malicious vehicles and remove the attack i. e. Sybil attack from the OLSR routing protocol. This remotion of attack from the OLSR protocol will increase the performance and stability of the network.


Keywords: MANET, VANET, Malicious node, Sybil Attack, Collision, V2V communication


Edition: Volume 5 Issue 5, May 2016


Pages: 1905 - 1910



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Amit Kumar, Varun Singla, "Detecting and Avoiding Sybil Attack in OLSR Protocol", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 1905-1910, https://www.ijsr.net/getabstract.php?paperid=19051604, DOI: https://www.doi.org/10.21275/19051604



Similar Articles

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article



Top