Abstract
While communicating nodes in Mobile Adhoc and Sensor Networks (MASNets), need to use multipath routing algorithms to tolerate nodes and links failures, it becomes interesting to let them specify to which extent these paths should be disjoint. Such feature is of high importance as it allows nodes to cope with the sensitivity of the used applications and the variation of the nodes density depending on the network area.
We develop in this paper a new secure multipath algorithm, which allows nodes in MASNet to perform an on-demand discovery and generation of a set of paths, while specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of the k established paths. The algorithm, which is called Secure Multipath Routing Algorithm for Mobile Adhoc and Sensor Networks (SeMuRAMAS), is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the use of Watchdog and digital signature, are used to protect the route discovery process. The conducted simulation estimates the additional overhead, showing the efficiency of the algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Li, S., Wu, Z.: Node-disjoint parallel multi-path routing in wireless sensor networks. In: Proceedings of the Second International Conference on Embedded Software and Systems, pp. 432–443 (December 2005)
Hanan, S., Michael, S.: k-fault resistance in wireless ad-hoc networks. In: Proceedings of the 2005 Joint Workshop on Foundations of Mobile Computing, pp. 89–96 (2005)
Law, Y., Yen, L., Pietro, R., Palaniswami, M.: Secure k-connectivity properties of wireless sensor networks. In: IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (2007)
Almasaeid, H.M., Kamal, A.E.: On the minimum k-connectivity repair in wireless sensor networks. In: The Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–5 (June 2009)
Dulman, S., Wu, J., Havinga, P.: An energy efficient multipath routing algorithm for wireless sensor networks. In: IEEE International Symposium on Autonomous Decentralized Systems (ISADS 2003), Pisa, Italy (April 2003)
Yang, P., Huang, B.: Multi-path routing protocol for mobile ad hoc network. In: International Conference on Computer Science and Software Engineering (2008)
Hou, X., Tipper, D., Kabara, J.: Label-based multipath routing in wireless sensor routing. In: Proceedings 6th International Symposium on Advanced Radio Technologies (ISART 2004), Boulder, CO (March 2-4, 2004)
Johnson, D.B., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing, vol. 353 (1996)
Lee, J., Lee, Y., Syrotiuk, V.R.: The performance of a watchdog protocol for wireless network security. International Journal of Wireless and Mobile Computing (May 2007)
Sliti, M., Hamdi, M., Boudriga, N.: An elliptic threshold signature framework for k-security in wireless sensor networks. In: 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008 (2008)
Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, nca, pp. 179–186 (2009)
Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks, 1st edn. (2007)
Krupadanam, S., Fu, H.: Beacon-less location detection in wireless sensor networks for non-flat terrains. International Journal of Software Engineering and Its Applications 2(3) (July 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Triki, B., Rekhis, S., Boudriga, N. (2012). Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networks. In: Obaidat, M.S., Tsihrintzis, G.A., Filipe, J. (eds) e-Business and Telecommunications. ICETE 2010. Communications in Computer and Information Science, vol 222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25206-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-25206-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25205-1
Online ISBN: 978-3-642-25206-8
eBook Packages: Computer ScienceComputer Science (R0)