Skip to main content

Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 222))

Abstract

While communicating nodes in Mobile Adhoc and Sensor Networks (MASNets), need to use multipath routing algorithms to tolerate nodes and links failures, it becomes interesting to let them specify to which extent these paths should be disjoint. Such feature is of high importance as it allows nodes to cope with the sensitivity of the used applications and the variation of the nodes density depending on the network area.

We develop in this paper a new secure multipath algorithm, which allows nodes in MASNet to perform an on-demand discovery and generation of a set of paths, while specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of the k established paths. The algorithm, which is called Secure Multipath Routing Algorithm for Mobile Adhoc and Sensor Networks (SeMuRAMAS), is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the use of Watchdog and digital signature, are used to protect the route discovery process. The conducted simulation estimates the additional overhead, showing the efficiency of the algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, S., Wu, Z.: Node-disjoint parallel multi-path routing in wireless sensor networks. In: Proceedings of the Second International Conference on Embedded Software and Systems, pp. 432–443 (December 2005)

    Google Scholar 

  2. Hanan, S., Michael, S.: k-fault resistance in wireless ad-hoc networks. In: Proceedings of the 2005 Joint Workshop on Foundations of Mobile Computing, pp. 89–96 (2005)

    Google Scholar 

  3. Law, Y., Yen, L., Pietro, R., Palaniswami, M.: Secure k-connectivity properties of wireless sensor networks. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (2007)

    Google Scholar 

  4. Almasaeid, H.M., Kamal, A.E.: On the minimum k-connectivity repair in wireless sensor networks. In: The Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–5 (June 2009)

    Google Scholar 

  5. Dulman, S., Wu, J., Havinga, P.: An energy efficient multipath routing algorithm for wireless sensor networks. In: IEEE International Symposium on Autonomous Decentralized Systems (ISADS 2003), Pisa, Italy (April 2003)

    Google Scholar 

  6. Yang, P., Huang, B.: Multi-path routing protocol for mobile ad hoc network. In: International Conference on Computer Science and Software Engineering (2008)

    Google Scholar 

  7. Hou, X., Tipper, D., Kabara, J.: Label-based multipath routing in wireless sensor routing. In: Proceedings 6th International Symposium on Advanced Radio Technologies (ISART 2004), Boulder, CO (March 2-4, 2004)

    Google Scholar 

  8. Johnson, D.B., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing, vol. 353 (1996)

    Google Scholar 

  9. Lee, J., Lee, Y., Syrotiuk, V.R.: The performance of a watchdog protocol for wireless network security. International Journal of Wireless and Mobile Computing (May 2007)

    Google Scholar 

  10. Sliti, M., Hamdi, M., Boudriga, N.: An elliptic threshold signature framework for k-security in wireless sensor networks. In: 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008 (2008)

    Google Scholar 

  11. Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, nca, pp. 179–186 (2009)

    Google Scholar 

  12. Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks, 1st edn. (2007)

    Google Scholar 

  13. Krupadanam, S., Fu, H.: Beacon-less location detection in wireless sensor networks for non-flat terrains. International Journal of Software Engineering and Its Applications 2(3) (July 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Triki, B., Rekhis, S., Boudriga, N. (2012). Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds) e-Business and Telecommunications. ICETE 2010. Communications in Computer and Information Science, vol 222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25206-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25206-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25205-1

  • Online ISBN: 978-3-642-25206-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics