Open Access Open Access  Restricted Access Subscription Access

Data Security through Node-Disjoint on Demand Multipath Routing in MANETs


Affiliations
1 Department of Computer Science, Rayalaseema University, Kurnool, India
2 Department of Computer Science and Technology, Sri Krishnadevaraya University, Ananthapuramu, India
 

Mobile Ad Hoc Networks(MANETs) are the wireless networks which can be deployed instantly without requiring any fixed wired infrastructure. MANETs are specifically very much useful in military, commercial and civilian applications. Since infrastructure less MANETs have dynamic topology and battery powered mobile nodes, it is a challenging task to provide secure data transmission between any pair of nodes in MANET. Multipath on Demand Routing is one possible solution to provide security in MANET. This paper proposes a new method (DSNMR) of providing secure communication by integrating trust based mechanism with multipath on demand routing approaches in MANETs. The simulation analysis of proposed method reveals the facts that the method provides significant security to the data compared to previous related work.

Keywords

Data Security, Mobile Ad Hoc Networks, Multipath Routing, Node-Disjoint, Protocol Design.
User
Notifications
Font Size

  • M Conti and S. Giordano, “Mobile ad hoc networking: Milestones, challenges, and new research directions,” IEEE Communications Magazine, 2014.
  • M. Conti et al., “From MANET to people-centric networking: Milestones and open research challenges,” Computer Communications, 2015.
  • J. Loo, J. L. Mauri, J. H. Ortiz, and D. A. Maltz, Mobile Ad Hoc Networks: Current Status and Future Trends. 2016.
  • G. V. Kumar, Y. V. Reddyr, and M. Nagendra, “Current Research Work on Routing Protocols for MANET : A Literature Survey,” International Journal on Computer Science and Engineering, 2010.
  • C. E. Perkins and P. Bhagwat, “Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers,” ACM SIGCOMM Computer Communication Review, 2004.
  • S. Murthy and J. J. Garcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” Mobile Networks and Applications, 1996.
  • C.-C. Chiang, H.-K. Wu, W. Liu, and M. Gerla, “ROUTING IN CLUSTERED MULTIHOP, MOBILE WIRELESS NETWORKS WITH FADING CHANNEL,” in Proc. IEEE SICON, 1997.
  • T. W. Chen and M. Gerla, “Global state routing: A new routing scheme for ad-hoc wireless networks,” in International Conference on Communications Proceedings, 1998.
  • C. K. Toh, “Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks,” IEEE Communications Magazine, 2001.
  • V. D. Park and M. S. Corson, “A highly adaptive distributed routing algorithm for mobile wireless networks,” 2002.
  • D. B. Johnson and D. A. Maltz, “DSR : The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks,” Computer Science Department, Carnegie Mellon University, Addison-Wesley, 2001.
  • C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings -WMCSA’99: 2nd IEEE Workshop on Mobile Computing Systems and Applications, 1999.
  • IETF, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” Draft-Ietf-Manet-Zone-Zrp-04, 2002.
  • R. H. Jhaveri, S. J. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” in Proceedings - 2012 2nd International Conference on Advanced Computing and Communication Technologies, ACCT 2012, 2011.
  • P. Goyal, S. Batra, and A. Singh, “A Literature Review of Security Attack in Mobile Ad-hoc Networks,” International Journal of Computer Applications, 2010.
  • A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” International Journal of Computer Science & Engineering Survey, 2015.
  • S. Sarika, A. Pravin, A. Vijayakumar, and K. Selvamani, “Security Issues in Mobile Ad Hoc Networks,” in Procedia Computer Science, 2016.
  • P. Papadimitratos and Z. J. Haas, “Secure message transmission in mobile ad hoc networks,” Ad Hoc Networks, 2003.
  • J. Liu, F. Fu, J. Xiao, and Y. Lu, “Secure routing for mobile ad hoc networks,” in Proceedings - SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007.
  • H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Communications Magazine, 2002.
  • X. Huang and Y. Fang, “Performance study of node-disjoint multipath routing in vehicular Ad Hoc networks,” IEEE Transactions on Vehicular Technology, 2009.
  • L. Liu and L. Cuthbert, “A novel QoS in nodedisjoint routing for ad hoc networks,” in IEEE International Conference on Communications, 2008.
  • Xuefei Li and L. Cuthbert, “On-demand nodedisjoint multipath routing in wireless ad hoc networks,” 2004.
  • J. Cai and W. Wu, “Degraded link-disjoint multipath routing in ad hoc networks,” in 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009, 2009.
  • J. Yi, A. Adnane, S. David, and B. Parrein, “Multipath optimized link state routing for mobile ad hoc networks,” Ad Hoc Networks, 2010.
  • B. Vaidya, J. Y. Pyun, S. Pan, and N. Y. Ko, “Secure framework for integrated multipath MANET with internet,” in Proceedings - 2008 International Symposium on Applications and the Internet, SAINT 2008, 2008.
  • S. Chen and M. Wu, “Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks,” in 2010 International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2010, 2010.
  • B. Vaidya, J. Y. Pyun, J. A. Park, and S. J. Han, “Secure multipath routing scheme for mobile ad hoc network,” in Proceedings - DASC 2007: Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2007.
  • G. M. Borkar and A. R. Mahajan, “A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks,” Wireless Networks, 2017.
  • X. Li, Z. Jia, P. Zhang, and H. Wang, “A trust-based multipath routing framework for mobile ad hoc networks,” in Proceedings - 2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010, 2010.
  • B. Vaidya, D. Y. Choi, J. A. Park, and S. J. Han, “Investigation of secure framework for multipath MANET,” International Journal of Security and its Applications, 2008.
  • S. Berton, H. Yin, C. Lin, and G. Min, “Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-hoc Networks,” in Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006, 2006.
  • S. Geetha and G. G. Ramani, “Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory,” 2012.
  • W. Lou, W. Liu, and Y. Fang, “SPREAD: Enhancing data confidentiality in mobile ad hoc networks,” in Proceedings - IEEE INFOCOM, 2004.
  • S. Adibi and S. Erfani, “A multipath routing survey for mobile ad-hoc networks,” in 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, 2006.
  • A. K. Abdelaziz, M. Nafaa, and G. Salim, “Survey of routing attacks and countermeasures in mobile ad hoc networks,” in Proceedings - UKSim 15th International Conference on Computer Modelling and Simulation, UKSim 2013, 2013.
  • P. Kotzanikolaou, R. Mavropodi, and C. Douligeris, “Secure multipath routing for mobile ad hoc networks,” in 2nd Annual Conference on Wireless On-Demand Network Systems and Services, WONS 2005, 2004.
  • Y. V. Reddy and M. Nagendra, “A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, vol. 5, no. 12, pp. 243–248, 2018.
  • P. P. and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks,” in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference ({CNDS 2002}), 2002.
  • M. Burmester and T. Van Le, “Secure multipath communication in mobile ad hoc networks,” in International Conference on Information Technology: Coding Computing, ITCC, 2004.
  • R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, “SecMR - a secure multipath routing protocol for ad hoc networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 87–99, Jan. 2007.
  • P. Gera, K. Garg, and M. Misra, “Trust-based multi-path routing for enhancing data security in MANETs,” International Journal of Network Security, 2014.
  • S. Bengio, G. Brassard, Y. G. Desmedt, C. Goutier, and J. J. Quisquater, “Secure implementation of identification systems,” Journal of Cryptology, 1991.
  • N. Koblitz, A. Menezes, and S. Vanstone, “The State of Elliptic Curve Cryptography,” in Towards a Quarter-Century of Public Key Cryptography, 2013.
  • J.-P. Hubaux, L. Buttyán, and S. Capkun, “The quest for security in mobile ad hoc networks,” 2003.
  • S. Yi and R. Kravets, “MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks,” in Proceedings of the 2nd Annual PKI Research Workshop (PKI ’03), 2003.
  • L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, 1999.
  • T. Issariyakul and E. Hossain, Introduction to network simulator NS2. 2012.
  • Periyasamy, P., and E. Karthikeyan. "A simulation based QoS review of multipath routing protocols for MANET." International Journal of Advanced Networking and Applications 4.3 (2012): 1624.

Abstract Views: 231

PDF Views: 0




  • Data Security through Node-Disjoint on Demand Multipath Routing in MANETs

Abstract Views: 231  |  PDF Views: 0

Authors

Y. Vasudeva Reddy
Department of Computer Science, Rayalaseema University, Kurnool, India
M. Nagendra
Department of Computer Science and Technology, Sri Krishnadevaraya University, Ananthapuramu, India

Abstract


Mobile Ad Hoc Networks(MANETs) are the wireless networks which can be deployed instantly without requiring any fixed wired infrastructure. MANETs are specifically very much useful in military, commercial and civilian applications. Since infrastructure less MANETs have dynamic topology and battery powered mobile nodes, it is a challenging task to provide secure data transmission between any pair of nodes in MANET. Multipath on Demand Routing is one possible solution to provide security in MANET. This paper proposes a new method (DSNMR) of providing secure communication by integrating trust based mechanism with multipath on demand routing approaches in MANETs. The simulation analysis of proposed method reveals the facts that the method provides significant security to the data compared to previous related work.

Keywords


Data Security, Mobile Ad Hoc Networks, Multipath Routing, Node-Disjoint, Protocol Design.

References