Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network

Authors

  • Vijaya Bhaskar M Department of Computer Science & Engineering, Rayalaseema University, India
  • GA Ramachandra Department of Computer Science, S.K. University, India
  • Y Deepika Government Polytechnic, Dharmavaram, India

DOI:

https://doi.org/10.26438/ijcse/v5i11.232241

Keywords:

Multi-Point Relay (MPR), Two Way Authentication (TWA), Adaptive Dijkstra Algorithm (ADA)

Abstract

Without the dependence of any infrastructure or central administration to create a temporary network that includes a group of nodes and wireless hosts called as the Adhoc Mobile Network (MANET). Where multipath routing in MANET has been used primarily to transmit data without interruption. Everywhere, the routing technique is primarily considered to ensure the transmission of the message while being used in some protocols. But transmission security is one of the main disadvantages of this network. Therefore, use Secure Multipath Optimized Link State Routing Protocol (SMOLSR), which is a proactive approach to routing protocol-controlled tables, to improve efficiency, which primarily depends on multipoint relay selection (MPR). A new routing protocol for MANET is the progress of the OLSR, which integrates the multi-route strategy and the source routing control scheme. In this protocol, a Dijkstra adaptive algorithm (ADA) has been developed to estimate short-time path based multipath routing and create a control node using the hop in hop authentication model through the bidirectional authentication process (TWA). Initially, find a more limited path using the Dijkstra calculation to create a duplicate topology. In this way, delete the inner and third centers, look for a second more limited path using the Dijkstra calculation. This methodology is called a multi-Dijkstra algorithm. The main objective of the research work defining the quality of the link and the selection of the paths. The TWA process is performed for security to effectively transmit the message. If an interrupt occurs in the source-destination path, it automatically confirms the route to deliver the end-user message without loss of data. The transmitted message is well protected by a TWA process. The performance of the proposed SMOLSR protocol is compared with the many traditional protocols such as OLSR, AOMDV and CA-AOMDV. As a result, the results of the proposed SMOLSR protocol have surpassed that of other protocols.

References

D. S. Dhenakaran and A. Parvathavarthini, "An overview of routing protocols in mobile ad-hoc network," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, 2013.

P. Periyasamy and E. Karthikeyan, "Survey of current multipath routing protocols for mobile ad hoc networks," International Journal of Computer Network and Information Security, vol. 5, p. 68, 2013.

H. Kaur, V. Sahni, and M. Bala, "A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review," network, vol. 4, pp. 498-500, 2013.

M. Marimuthu and I. Krishnamurthi, "Enhanced OLSR for defense against DOS attack in ad hoc networks," journal of communications and networks, vol. 15, pp. 31-37, 2013.

D. Natarajan and A. P. Rajendran, "AOLSR: hybrid ad hoc routing protocol based on a modified Dijkstra's algorithm," EURASIP Journal on Wireless Communications and Networking, vol. 2014, p. 90, 2014.

E. S. A. Ganie and M. N. Sharma, "Interference-Aware and Fault Tolerant Multipath Routing Protocols for Mobile Ad Hoc Networks," International Journal of Engineering Science, vol. 2524, 2016.

C. B. Dutta and U. Biswas, "A novel blackhole attack for multipath AODV and its mitigation," in Recent Advances and Innovations in Engineering (ICRAIE), 2014, 2014, pp. 1-6.

Vipul Kumar, Musheer Vaqar, "BLACK HOLE Attack: A New Detection Technique", International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.63-67, 2016.

K. Somasundaram, "An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet," Indian Journal of Science and Technology, vol. 9, 2016.

P. Pavithra, "Averting Techniques of Black-Hole Attack–A Survey," Indian Journal of Science and Technology, vol. 9, 2016.

M. S. A. A. Mahmood, D. T. M. Hasan, and M. S. D. S. Ibrahim, "Modified AODV routing protocol to detect the black hole attack in MANET," International Journal, vol. 5, 2015.

R. Ahlawat and S. K. Chaturvedi, "A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET," International Journal of Computer Applications, vol. 80, 2013.

Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.

M. K. P. Dubey and E. K. Barua, "A Review-Techniques to Mitigate Black/Gray Hole Attacks in MANET," Engineering Universe for Scientific Research and Management (EUSRM) Volume, vol. 6, 2014.

C. She, P. Yi, J. Wang, and H. Yang, "Intrusion Detection for Black Hole and Gray Hole in MANETs," TIIS, vol. 7, pp. 1721-1736, 2013.

S. Mandala, M. A. Ngadi, J. M. Sharif, M. S. M. Zahid, and F. Mohamed, "Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks," International Journal of Embedded Systems, vol. 7, pp. 296-305, 2015.

A. Adnane, C. Bidan, and R. T. de Sousa Júnior, "Trust-based security for the OLSR routing protocol," Computer Communications, vol. 36, pp. 1159-1171, 2013.

Vinita keer and Syed Imran Ali, "A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.54-58, 2016.

Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013

Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.

S. Ali, S. A. Madani, and I. A. Khan, "Routing protocols for mobile sensor networks: A comparative study," arXiv preprint arXiv:1403.3162, 2014.

R. K. Gujral, J. Grover, A. Anjali, and S. Rana, "Impact of transmission range and mobility on routing protocols over ad hoc networks," in Computing Sciences (ICCS), 2012 International Conference on, 2012, pp. 201-206.

A. S. Otero and M. Atiquzzaman, "Adaptive localized active route maintenance mechanism to improve performance of voIP over ad hoc networks," 2011.

A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, "Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function," IEEE Access, vol. 5, pp. 10369-10381, 2017.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v5i11.232241
Published: 2025-11-12

How to Cite

[1]
M. Vijaya Bhaskar, G. Ramachandra, and Y. Deepika, “Multipath Optimised Link State Protocol (OLSR) with Security for Mobile Ad-Hoc Network”, Int. J. Comp. Sci. Eng., vol. 5, no. 11, pp. 232–242, Nov. 2025.

Issue

Section

Research Article