Black hole attack detection and ignoring in OLSR protocol
by Kamel Saddiki; Sofiane Boukli-Hacene; Pascal Lorenz; Marc Gilg
International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 4, No. 1, 2017

Abstract: Mobile ad hoc network (MANET) is a wireless network formed by the cooperation of arbitrary nodes moving randomly in arbitrary directions, the communication between nodes is established by using routing protocols. In the scenario of a dense network with a low-mobility, we use proactive routing protocols. The optimised link state routing protocol is one of the most proactive routing protocols commonly used, despite the fact that OLSR has many advantages, it is still vulnerable to attacks such as the black hole. In this paper, we present a kind of black hole attack in which the malicious node announces a fake link with the three hop neighbours, this may lead to the selection of this node as an MPR. Then it can divert all traffic. We demonstrate the feasibility of this attack through a detailed simulation using NS2 simulator. After that, we present a preferment scheme to detect and isolate malicious nodes.

Online publication date: Fri, 19-Jan-2018

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Trust Management in Computing and Communications (IJTMCC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?

Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email