Skip to main content

Secure Multipath Routing for Efficient Load Balancing and Jamming Attack Protection

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1057))

Abstract

Mobile ad hoc network (MANET) brings simplicity and flexibility but also introduces constraints due to mobility, dynamic configuration, limited resources, and security. Security is among the most important limitations in MANET. Because of its distinctive features, MANET creates a variety of serious challenges. The various protection schemes aligned with routing makes efforts in lowering threat perception. In this paper, a novel security mechanism named secure multipath routing (SMR) for MANET is proposed for jamming attacks that also takes care of routing and load balancing. The proposed technique will first identify the attacked node, and then, it will not allow other attacker node/s. Thereafter, as a corrective measure it blocks the activity of offender and drops it from the routing. SMR is then judged against conventional AODV and AOMDV protocols in NS-2.35. Experimental results show that the proposed SMR demonstrates better results in terms of throughput, average end-to-end delay, packet delivery ratio, and routing overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cao, Q., Abdelzaher, T., Stankovic, J., Whitehouse, K., Luo, L.: Declarative tracepoints: a programmable and application independent debugging system for wireless sensor networks. In: Proceedings of the ACM SenSys, Raleigh, NC, USA, pp. 85–98 (2008)

    Google Scholar 

  2. Shu, T., Krunz, M., Liu, S.: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput. 9(7), 941–954 (2010)

    Article  Google Scholar 

  3. Salem, A.M., Yadav, R.: Efficient load balancing routing technique for mobile Ad Hoc networks. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 7(5), 249–254 (2016)

    Google Scholar 

  4. Thakur, N., Sankaralingam, A.: Introduction to Jamming attacks and prevention techniques using Honey pots in wireless networks. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 3(2), 202–207 (2013)

    Google Scholar 

  5. Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile Ad Hoc networks. In: Wireless On-demand Network Systems and Services, WOWMOM, pp. 581–587 (2005)

    Google Scholar 

  6. Nasser, N., Chen, Y.: Secure multipath routing protocol for wireless sensor networks. In: 27th International Conference on Distributed Computing Systems Workshops (ICDCSW’07) (2007)

    Google Scholar 

  7. Stavrou, E., Pitsillides, A.: A survey on secure multipath routing protocols in WSNs. Comput. Netw. Int. J. Comput. Telecommun. Netw. 54(13), 2215–2238 (2010)

    MATH  Google Scholar 

  8. Vasudevan, A.R., Sanyal, S.: A novel multipath approach to security in mobile Ad Hoc networks (MANETs). In: Proceedings of International Conference on Computers and Devices for Communication (CODEC’04), pp. 1–4 (2004)

    Google Scholar 

  9. Li, X., Ma, Q., Cao, Z., Liu, K., Liu, Y.: Enhancing visibility of network performance in large-scale sensor networks. In: Proceedings of the IEEE ICDCS, Madrid, Spain, pp. 409–418 (2014)

    Google Scholar 

  10. Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight-based secure approach for identifying selfishness behavior of node in MANET, information and decision sciences. Adv. Intell. Syst. Comput. 701, 387–397 (2018) (Springer, Heidelberg)

    Google Scholar 

  11. Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016). (Elsevier)

    Article  Google Scholar 

  12. Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)

    Google Scholar 

  13. Saurabh, P., Verma, B., Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012), vol. 202 of the series Advances in Intelligent Systems and Computing, pp 417–428. Springer, Heidelberg (2012)

    Google Scholar 

  14. Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. Recent Trends Comput. Netw. Distrib. Syst. Secur. 335, 474–484 (2011). (CCIS, Springer)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Diksha Singhal or Praneet Saurabh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singhal, D., Prasad, R., Saurabh, P. (2020). Secure Multipath Routing for Efficient Load Balancing and Jamming Attack Protection. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_60

Download citation

Publish with us

Policies and ethics