Skip to main content

A Simulation Analyses of MANET’s Attacks Against OLSR Protocol with ns-3

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Edition 3 (SCA 2019)

Abstract

During the last decade, the Internet of Things (IoT) became an emerging technology, it is exploring in every area of human life. The IoT provide facilities to identify and communicate the Smart devices, this last can transfer data in Mobile Ad hoc Networks (MANETs) across all active devices without the need for a centralized approach. The connection between MANETs and Internet of Things opens new ways or provision of services in smart environments and challenging issues in its networking aspects also. Simultaneously, MANETs are threatened by different attacks, which aim to degrade the network’s performances. In this article, we simulate and study the impact of Link-spoofing, Data-flooding and Replay attacks with Optimized Link State Routing Protocol (OLSR) (RFC 3626) on using ns-3 simulator. In this work, we took into consideration the density of the network by the number of nodes included in the network, the speed of the nodes, the mobility model and even we chose the IEEE 802.11ac (WIFI 5) standard, in order to have a simulation, which deals more general and more real scenarios. To analyze the impact of the attack on the network, we chose the Quality of Service (QoS) metrics for performance evaluation: Packet delivery rate (PDR), Normalized routing load (NRL) and End-to-End delay (EtED).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of MANET and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558–3567 (2013)

    Article  Google Scholar 

  2. Tokognon, C.A., Gao, B., Tian, G.Y., Yan, Y.: Structural health monitoring framework based on Internet of Things: a survey. IEEE Internet Things J. 4(3), 619–635 (2017)

    Article  Google Scholar 

  3. Pan, M.S., Yang, S.W.: A lightweight and distributed geographic multicast routing protocol for IoT applications. Comput. Netw. 112, 95–107 (2017)

    Article  Google Scholar 

  4. Jabbar, W.A., Ismail, M., Nordin, R., Arif, S.: Power-efficient routing schemes for MANETs: a survey and open issues. Wirel. Netw. 23(6), 1917–1952 (2017)

    Article  Google Scholar 

  5. Jabbar, W.A., Saad, W.K., Ismail, M.: MEQSA-OLSRv2: a multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access 6, 76546–76572 (2018)

    Article  Google Scholar 

  6. Karlsson, J., Dooley, L.S., Pulkkis, G.: Secure routing for MANET connected Internet of Things systems. In: Proceedings of the 2018 IEEE 6th International Conference on Future Internet of Things and Cloud, FiCloud 2018, pp. 114–119 (2018)

    Google Scholar 

  7. Bruzgiene, A., Narbutaite, L., Adomkus, T.: MANET network in Internet of Things system. In: Long-Haul Travel Motivation by International Tourist to Penang, vol. i, no. tourism, p. 13 (2018)

    Google Scholar 

  8. Sbai, O., Elboukhari, M.: A simulation analyse of MANET’s RREQ Flooding and HELLO Flooding attacks with ns-3, pp. 1–5 (2019)

    Google Scholar 

  9. Sbai, O., Elboukhari, M.: Simulation of MANET’s single and multiple blackhole attack with NS-3. In: Colloquium on Information Science and Technology, CiSt, vol. 2018-Octob, pp. 612–617 (2018)

    Google Scholar 

  10. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  11. Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR), pp. 1–75 (2003)

    Google Scholar 

  12. Jeon, Y., Kim, T.H., Kim, Y., Kim, J.: LT-OLSR: attack-tolerant OLSR against link spoofing. In: Proceedings of the Conference on Local Computer Networks, LCN, pp. 216–219 (2012)

    Google Scholar 

  13. Desai, V.: Performance evaluation of OLSR protocol in MANET under the influence of routing attack, pp. 138–143 (2014)

    Google Scholar 

  14. Sbai, O., Elboukhari, M.: Classification of mobile ad hoc networks attacks. In: Colloquium Information Science and Technology, CiSt, vol. 2018-Octob, pp. 618–624 (2018)

    Google Scholar 

  15. Kristiansen, S.: Ns-3 tutorial (2010)

    Google Scholar 

  16. Nisar, M.A., Mehmood, A., Nadeem, A., Ahsan, K., Sarim, M.: A two dimensional performance analysis of mobility models for MANETs and VANETs. Res. J. Recent Sci. 3(5), 94–103 (2014)

    Google Scholar 

  17. Technical white paper: 802.11ac: the fifth generation of Wi-Fi, pp. 1–25, March 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Oussama Sbai or Mohamed Elboukhari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sbai, O., Elboukhari, M. (2020). A Simulation Analyses of MANET’s Attacks Against OLSR Protocol with ns-3. In: Ben Ahmed, M., Boudhir, A., Santos, D., El Aroussi, M., Karas, İ. (eds) Innovations in Smart Cities Applications Edition 3. SCA 2019. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-37629-1_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37629-1_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37628-4

  • Online ISBN: 978-3-030-37629-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics