Skip to main content

Path Hopping Based on Reverse AODV for Security

  • Conference paper
Management of Convergence Networks and Services (APNOMS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4238))

Included in the following conference series:

Abstract

In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node and enhance data security is an important issue on Ad hoc networks. In this study, we provide a path hopping method based on reverse AODV (R-AODV). By reverse AODV, source node builds multipath to destination and adaptively hops available paths for data communications. Hopping paths can protect data from the intrusion of malicious nodes. We propose an analytic method to expect intrusion rate and a path hopping routing mechanism to implement simulation models using NS-2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perkins, C., Belding-Royer, E.: Ad hoc on-Demand Distance Vector (AODV) Routing. RFC 3561 (July 2003)

    Google Scholar 

  2. Kim, C., Talipov, E., Ahn, B.: A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol. 4097, pp. 522–531. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Lee, C.K.-L., Lin, X.-H., Kwok, Y.-K.: A Multipath Ad Hoc Routing Approach to Combat Wireless Link Insecurity. In: Proc. ICC 2003, vol. 1, pp. 448–452 (May 2003)

    Google Scholar 

  4. Lee, S.-J., Gerla, M.: Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In: Proc. ICC 2001, vol. 10, pp. 3201–3205 (June 2001)

    Google Scholar 

  5. Marina, M.K., Das, S.R.: On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks. In: Proc. ICNP 2001, pp. 14–23 (November 2001)

    Google Scholar 

  6. NS, The UCB/LBNL/VINT Network Simulator (NS) (2004), http://www.isi.edu/nsnam/ns/

  7. Li, Z., Kwok, Y.-K.: A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. In: Proc. ICPPW 2005 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Talipov, E., Jin, D., Jung, J., Ha, I., Choi, Y., Kim, C. (2006). Path Hopping Based on Reverse AODV for Security. In: Kim, YT., Takano, M. (eds) Management of Convergence Networks and Services. APNOMS 2006. Lecture Notes in Computer Science, vol 4238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11876601_69

Download citation

  • DOI: https://doi.org/10.1007/11876601_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45776-3

  • Online ISBN: 978-3-540-46233-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics