Skip to main content
Log in

A Safe Proactive Routing Protocol SDSDV for Ad Hoc Network

  • Published:
International Journal of Wireless Information Networks Aims and scope Submit manuscript

Abstract

In mobile Ad Hoc network, nodes move freely, this can lead to frequent changes of network topology. Routing protocol algorithm is the strategy to establish communication links for network nodes, and its performance influences the availability of Ad Hoc network directly. By using wireless channel to transmit data in Ad Hoc network, the invaded malicious nodes will cause various attacks, aim to steal the transmission data or destroy the network. Based on the traditional proactive routing protocol for Ad Hoc network, an improved safe routing strategy SDSDV is put forward to resist attacks against routing protocols. The safe proactive routing protocol includes route request and route response two stages. When the network initialization is complete, after successful identity authentication by each other, secure communication paths are established between nodes and the encrypted data will be transmission through the path. The protocol integrates distributed authentication, encryption algorithm, hash check, and other security policy together. SDSDV protocol reduces the risk of malicious manipulation of routing information and ensures the safe and reliable routing between the source and destination nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

References

  1. Z. J. Hass et al., Wireless ad hoc networks, IEEE Journal on Selected Areas in Communications, 1999.

  2. Jason N. Turner and Clive S. Boyer, Ad hoc networks: new reseach, Nova Science PublishersNew York, 2009.

    Google Scholar 

  3. W. Jinglong, Ad Hoc mobile wireless network. Beijing, 2004. 5:1–10.

  4. Z. Xihai, F. Junlong, M. Fanfeng, An efficient node localization approach with RSSI for randomly deployed wireless sensor networks, Journal of Electrical and Computer Engineering, pp. 1–11, 2016.

  5. F. Shu, Z. Honglin, Cross-layer control with worst case delay guarantees in multihop wireless networks, Journal of Electrical and Computer Engineering, 2016.

  6. Md. J. H. Biddut, N. Islam, Md. M. Karim, and M. B. A. Miah, An analysis of QoS in ZigBee network based on deviated node priority, pp. 1–8, 2016.

  7. N. Shizhao, W. Zheng, P. Wangmo, N. Yuan and L. Peng, Big data prediction of durations for online collective actions based on peak’s timing, Physica A: Statistical Mechanics and its Applications, Vol. 55, pp. 130–139, 2018.

    Google Scholar 

  8. Z. Hass and M. Pearlman, The zone routing protocol(ZRP) for Ad Hoc networks, IETF Internet Draft, draft-ietf-manet-zone-zrp-04.txt, 2002.

  9. D. Johnson, The dynamic source routing protocol for mobile ad hoc networks(DSR), IETF Internet Draft, draft-ietf-manet-dsr-09.txt, 2003.

  10. C. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, pp. 234–244, 1994.

  11. C. Perkins, E. Belding-Royer, and S. Das, Ad Hoc on-demand distance vector (AODV) routing, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, Vol. 6, No. 7, pp. 90–100, 2000.

  12. M. A. Monis, J. Noman, and A. Muzammil, Integrated mechanism of routing and key exchange in AODV, WSEAS Transactions on Communications, Vol. 6, No. 4, pp. 565–572, 2007.

  13. Y. Hu, A. Perrig, and D. Johnson Ariadne, A secure on-demand routing protocol for ad hoc networks, ACM MOBICOM, No. 1, pp. 21–38, 2005.

  14. V. Lakshmi and P. Arrival Dharma, Strategies for enhancing routing security in protocols for mobile ad hoc networks, Journal of Parallel and Distributed Computing, Vol. 63, No. 2, pp. 214–227, 2003.

    Article  MATH  Google Scholar 

  15. M. Z. Zapata, N. Asokan, Securing ad-hoc routing protocols, Proc. of the 2002 ACM Workshop on Wireless Security (WiSe2002). Singapore: IEEE Computer Society Press, pp. 1–10, 2002.

  16. Y. Chun and S. Meilin, QoS based routing protocol in Ad Hoc Networks, Chinese Journal of Computers, Vol. 24, No. 10, pp. 1026–1033, 2001.

    Google Scholar 

  17. K. Snazgiri, B. Dahill, et al, A secure routing protocol for ad hoc networks, Proceedings of the 10 th IEEE International Conference on Network Protocols (ICNP’02), pp. 1–10, 2002.

  18. Y. Yongfei and Y. Meisheng, Secure key management scheme based on cluster architecture in mobile Ad Hoc networks, Computer Applications, Vol. 27, No. 3, pp. 611–613, 2007.

    Google Scholar 

  19. A. Shamir, How to Share a Secret, Communications of the ACM, Vol. 24, No. 11, pp. 612–613, 1979.

    Article  MathSciNet  MATH  Google Scholar 

  20. W. Diffie and M. Hellman, New directions in cryptography, IEEE Transaction on Information Theory, Vol. 22, No. 6, pp. 644–654, 1976.

    Article  MathSciNet  MATH  Google Scholar 

  21. L. Xiaoqing, Research of secure routing protocol for mobile ad hoc netorks, Xi’an: Xidian University, pp. 17–26, 2011.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Sun.

Additional information

Xinghua Sun: Population Health Information in Hebei Province Engineering Technology Research Center; Medical Information in Hebei Universities Application Technology Research and Development Center.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ye, Y., Feng, S., Liu, M. et al. A Safe Proactive Routing Protocol SDSDV for Ad Hoc Network. Int J Wireless Inf Networks 25, 348–357 (2018). https://doi.org/10.1007/s10776-018-0407-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10776-018-0407-2

Keywords