A Simulation Analyses of MANET’s Attacks Against OLSR Protocol with ns-3

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

During the last decade, the Internet of Things (IoT) became an emerging technology, it is exploring in every area of human life. The IoT provide facilities to identify and communicate the Smart devices, this last can transfer data in Mobile Ad hoc Networks (MANETs) across all active devices without the need for a centralized approach. The connection between MANETs and Internet of Things opens new ways or provision of services in smart environments and challenging issues in its networking aspects also. Simultaneously, MANETs are threatened by different attacks, which aim to degrade the network’s performances. In this article, we simulate and study the impact of Link-spoofing, Data-flooding and Replay attacks with Optimized Link State Routing Protocol (OLSR) (RFC 3626) on using ns-3 simulator. In this work, we took into consideration the density of the network by the number of nodes included in the network, the speed of the nodes, the mobility model and even we chose the IEEE 802.11ac (WIFI 5) standard, in order to have a simulation, which deals more general and more real scenarios. To analyze the impact of the attack on the network, we chose the Quality of Service (QoS) metrics for performance evaluation: Packet delivery rate (PDR), Normalized routing load (NRL) and End-to-End delay (EtED).

Cite

CITATION STYLE

APA

Sbai, O., & Elboukhari, M. (2020). A Simulation Analyses of MANET’s Attacks Against OLSR Protocol with ns-3. In Lecture Notes in Intelligent Transportation and Infrastructure (Vol. Part F1409, pp. 605–618). Springer Nature. https://doi.org/10.1007/978-3-030-37629-1_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free