Abstract
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node and enhance data security is an important issue on Ad hoc networks. In this study, we provide a path hopping method based on reverse AODV (R-AODV). By reverse AODV, source node builds multipath to destination and adaptively hops available paths for data communications. Hopping paths can protect data from the intrusion of malicious nodes. We propose an analytic method to expect intrusion rate and a path hopping routing mechanism to implement simulation models using NS-2.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perkins, C., Belding-Royer, E.: Ad hoc on-Demand Distance Vector (AODV) Routing. RFC 3561 (July 2003)
Kim, C., Talipov, E., Ahn, B.: A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol. 4097, pp. 522–531. Springer, Heidelberg (2006)
Lee, C.K.-L., Lin, X.-H., Kwok, Y.-K.: A Multipath Ad Hoc Routing Approach to Combat Wireless Link Insecurity. In: Proc. ICC 2003, vol. 1, pp. 448–452 (May 2003)
Lee, S.-J., Gerla, M.: Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In: Proc. ICC 2001, vol. 10, pp. 3201–3205 (June 2001)
Marina, M.K., Das, S.R.: On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks. In: Proc. ICNP 2001, pp. 14–23 (November 2001)
NS, The UCB/LBNL/VINT Network Simulator (NS) (2004), http://www.isi.edu/nsnam/ns/
Li, Z., Kwok, Y.-K.: A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. In: Proc. ICPPW 2005 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Talipov, E., Jin, D., Jung, J., Ha, I., Choi, Y., Kim, C. (2006). Path Hopping Based on Reverse AODV for Security. In: Kim, YT., Takano, M. (eds) Management of Convergence Networks and Services. APNOMS 2006. Lecture Notes in Computer Science, vol 4238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11876601_69
Download citation
DOI: https://doi.org/10.1007/11876601_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45776-3
Online ISBN: 978-3-540-46233-0
eBook Packages: Computer ScienceComputer Science (R0)