Abstract
Mobile ad hoc network (MANET) is an appealing technology that has attracted lots of research efforts. On-demand routing protocol such as AODV may suffer from frequent topological changes. Due to frequent communication failures, multipath MANET is preferred than single-path MANET in many applications as former is used for achieving robustness and load balancing and improving reliability. Although multipath MANET is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; MANETs are known to be particularly vulnerable to security attack. The paper presents a design of robust and secure framework for multipath MANET. In this paper, we propose not only a robust multipath routing protocol but also an extended security scheme. We discuss security analysis for proposed security scheme. And we also conduct simulation to evaluate such a framework through different performance metrics. Results show that the proposed routing protocol achieves better performance in terms of various metrics than other protocols.












Similar content being viewed by others
References
Perkins CE, Belding-Royer EM, Das S (2003) Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561
Mueller S, Tsang RP, Ghosal D (2004) Multipath routing in mobile ad hoc networks: issues and challenges. In: Performance tools and applications to networked systems. LNCS, vol 2965, pp 209–234
Kotzanikolaou P, Mavropodi R, Douligeris C (2005) Secure multi-path routing for mobile ad hoc networks. In: Proceedings of 2nd annual conference on wireless on-demand network systems and services (WONS 2005), Switzerland, pp 89–96
Lee S-J, Gerla M (2001) Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of IEEE international conference on communications ICC’01, Helsinki, Finland, vol 3, pp 867–871
Marina MK, Das SR (2006) Ad hoc on-demand multipath distance vector routing. Wiley Wireless Commun Mobile Comput 6(7):969–988
Ye Z, Krishnamurthy SV, Tripathi SK (2004) A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad Hoc Netw J 2(1):87–107
Li X, Cuthbert L (2004) On-demand node-disjoint multipath routing in wireless ad hoc networks. In: Proceedings of IEEE conference on local computer networks (LCN 2004), Tampa, FL, USA, pp 419–420
Lee S-J, Gerla M (2000) AODV-BR: backup routing in ad hoc networks. In: Proceedings of IEEE wireless communications and networking conference—WCNC 2000, vol 3. Chicago, IL, USA, pp 1311–1316
Anjum F, Mouchtaris P (2007) Security for wireless ad hoc networks. Wiley, London
Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, USA
Mavropodi R, Kotzanikolaoua P, Douligerisa C (2007) SecMR—a secure multipath routing protocol for ad hoc networks. Elsevier Ad Hoc Netw J 5:87–99
Burmester M, Van Le T (2004) Secure multipath communication in mobile ad hoc networks. In: Proceedings of the international conference on information technology: coding and computing (ITCC’04), Las Vegas, USA, vol 2, pp 405–409
Berton S, Yin H, Lin C, Min G (2006) Secure, disjoint, multipath source routing protocol (SDMSR) for mobile ad-hoc networks. In: Proceedings of the fifth international conference on grid and cooperative computing (GCC’06), pp 387–394
Marshall J, Thakur V, Yasinsac A (2003) Identifying flaws in the secure routing protocol. In: Proceedings of 22nd IEEE international performance computing and communications conference IPCCC 2003, pp 167–174
Reddy LR, Raghavan SV (2007) SMORT: scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Netw J 5(2):162–188
Girault M (1991) Self-certified public keys. In: Proceedings of advances in cryptology: Eurocrypt’91. Springer, Heidelberg, pp 490–497
Petersen H, Horster P (1997) Self-certified keys—concepts and application. In: Proceedings of international conference on communications and multimedia security (CMS’97), Chapman & Hall, London, pp 102–116
Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30
Desmedt YG (1994) Threshold cryptography. Eur Trans Telecommun 5(4):449–457
Lee B, Kim K (2000) Self-certificate: PKI using self-certified key. In: Proceedings of conference on information security and cryptology CISC 2000, vol 10(1), pp 65–73
Li Z, Garcia-Luna-Aceves JJ (2007) Non-interactive key establishment in mobile ad hoc networks. Elsevier Ad Hoc Netw J 5(7):1194–1203
Araz O, Qi H (2006) Load-balanced key establishment methodologies in wireless sensor networks. Int J Secur Netw 1(3–4):158–166
Dahill B, Levine BN, Royer E, Shields C (2001) A secure routing protocol for ad hoc networks. Technical report 01-37. University of Massachusetts, USA
Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM (2005) Authenticated routing for ad hoc networks. IEEE J Sel Areas Commun 23(3):598–610
Gupte S, Singhal M (2003) Secure routing in mobile wireless ad hoc networks. Elsevier Ad Hoc Netw J 1(1):151–174
Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of 2003 ACM workshop on Wireless security (WiSe’03), pp 30–40
OPNET Modeler Simulation Software. http://www.opnet.com
Ammari HM (2007) A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet. Wiley Int J Commun Syst 20(8):943–968
Argyroudis PG, O’Mahony D (2005) Secure routing for mobile ad hoc networks. IEEE Commun Surv Tutorials 7(3):2–21
Buttyan L, Vajda I (2004) Towards provable security for ad hoc routing protocols. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (SASN’04), Washington DC, pp 94–105
Acknowledgments
This study was supported (in part) by research funds from Chosun University 2007.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vaidya, B., Yeo, SS., Choi, DY. et al. Robust and secure routing scheme for wireless multihop network. Pers Ubiquit Comput 13, 457–469 (2009). https://doi.org/10.1007/s00779-009-0220-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-009-0220-0