Skip to main content
Erschienen in: Wireless Networks 8/2017

24.05.2016

A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks

verfasst von: Gautam M. Borkar, A. R. Mahajan

Erschienen in: Wireless Networks | Ausgabe 8/2017

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A mobile ad hoc network (MANET) is a self-configurable network connected by wireless links. This type of network is only suitable for provisional communication links as it is infrastructure-less and there is no centralized control. Providing QoS and security aware routing is a challenging task in this type of network due to dynamic topology and limited resources. The main purpose of secure and trust based on-demand multipath routing is to find trust based secure route from source to destination which will satisfy two or more end to end QoS constraints. In this paper, the standard ad hoc on-demand multi-path distance vector protocol is extended as the base routing protocol to evaluate this model. The proposed mesh based multipath routing scheme to discover all possible secure paths using secure adjacent position trust verification protocol and better link optimal path find by the Dolphin Echolocation Algorithm for efficient communication in MANET. The performance analysis and numerical results show that our proposed routing protocol produces better packet delivery ratio, reduced packet delay, reduced overheads and provide security against vulnerabilities and attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Corson, M. S., Macker, P. J., & Cirincione, G. H. (1999). Internet-based mobile ad hoc networking. Internet Computing, IEEE, 3(4), 63–70.CrossRef Corson, M. S., Macker, P. J., & Cirincione, G. H. (1999). Internet-based mobile ad hoc networking. Internet Computing, IEEE, 3(4), 63–70.CrossRef
2.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 12(100), 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 12(100), 3172–3186.CrossRef
3.
Zurück zum Zitat Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.CrossRef Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.CrossRef
4.
Zurück zum Zitat Azedine, B., El-Khatiba, K., Xua, L., & Korbab, L. (2005). An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Computer Communications, 28(10), 1193–1203.CrossRef Azedine, B., El-Khatiba, K., Xua, L., & Korbab, L. (2005). An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Computer Communications, 28(10), 1193–1203.CrossRef
5.
Zurück zum Zitat Li, Wenjia, & Joshi, Anupam. (2008). Security issues in mobile ad hoc networks—A survey (pp. 1–23). Baltimore County: Department of Computer Science and Electrical Engineering, University of Maryland. Li, Wenjia, & Joshi, Anupam. (2008). Security issues in mobile ad hoc networks—A survey (pp. 1–23). Baltimore County: Department of Computer Science and Electrical Engineering, University of Maryland.
6.
Zurück zum Zitat Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
7.
Zurück zum Zitat Yang, Hao, HaiyunLuo, Fan Ye, Songwu, Lu, & Zhang, Lixia. (2004). Security in mobile ad hoc networks: Challenges and solutions. Wireless Communications, IEEE, 11(1), 38–47.CrossRef Yang, Hao, HaiyunLuo, Fan Ye, Songwu, Lu, & Zhang, Lixia. (2004). Security in mobile ad hoc networks: Challenges and solutions. Wireless Communications, IEEE, 11(1), 38–47.CrossRef
8.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on 2010 distributed computing systems workshops (ICDCSW) (pp. 52–61). Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on 2010 distributed computing systems workshops (ICDCSW) (pp. 52–61).
9.
Zurück zum Zitat Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.CrossRef Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.CrossRef
10.
Zurück zum Zitat Mohapatra, P., Li, J., & Gui, C. (2003). QoS in mobile ad hoc networks. IEEE Wireless Communications, 10(3), 44–53.CrossRef Mohapatra, P., Li, J., & Gui, C. (2003). QoS in mobile ad hoc networks. IEEE Wireless Communications, 10(3), 44–53.CrossRef
11.
Zurück zum Zitat Wu, C., Zhang, F., & Yang, H. (2010). A novel QoS multipath path routing in MANET. International Journal of Digital Content Technology and its Applications, 4(3), 132–136.CrossRef Wu, C., Zhang, F., & Yang, H. (2010). A novel QoS multipath path routing in MANET. International Journal of Digital Content Technology and its Applications, 4(3), 132–136.CrossRef
12.
Zurück zum Zitat Jiang, S., Liu, Y., Jiang, Y., & Yin, Q. (2004). Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE Journal on Selected Areas in Communications, 22(7), 1347–1356.CrossRef Jiang, S., Liu, Y., Jiang, Y., & Yin, Q. (2004). Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE Journal on Selected Areas in Communications, 22(7), 1347–1356.CrossRef
13.
Zurück zum Zitat Wan, J., Liu, J., Shao, Z., Vasilakos, A. V., Imran, M., & Zhou, K. (2016). Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors, 16(1), 88.CrossRef Wan, J., Liu, J., Shao, Z., Vasilakos, A. V., Imran, M., & Zhou, K. (2016). Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors, 16(1), 88.CrossRef
14.
Zurück zum Zitat Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
15.
Zurück zum Zitat Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. Mobile Computing, IEEE Transactions, 14(4), 742–754.CrossRef Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. Mobile Computing, IEEE Transactions, 14(4), 742–754.CrossRef
16.
Zurück zum Zitat Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2011). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press. Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2011). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
17.
Zurück zum Zitat Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 30(52), 1.CrossRef Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 30(52), 1.CrossRef
18.
Zurück zum Zitat Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security. IEEE Transactions, 10(3), 471–484. Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security. IEEE Transactions, 10(3), 471–484.
19.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.CrossRef
20.
Zurück zum Zitat Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
21.
Zurück zum Zitat Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions, 3, 436–450.CrossRef Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions, 3, 436–450.CrossRef
22.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.CrossRef
23.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In 2010 IEEE 30th international conference distributed computing systems workshops (ICDCSW) (pp. 52–61). Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In 2010 IEEE 30th international conference distributed computing systems workshops (ICDCSW) (pp. 52–61).
24.
Zurück zum Zitat Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRef Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRef
25.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Re Trust: Attack-resistant and lightweight trust management for medical sensor networks. Information Technology in Biomedicine, IEEE Transactions, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Re Trust: Attack-resistant and lightweight trust management for medical sensor networks. Information Technology in Biomedicine, IEEE Transactions, 16(4), 623–632.CrossRef
26.
Zurück zum Zitat Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. Information Forensics and Security, IEEE Transactions, 10(6), 1299–1314.CrossRef Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. Information Forensics and Security, IEEE Transactions, 10(6), 1299–1314.CrossRef
27.
Zurück zum Zitat Paramasivan, B., Prakash, M. J. V., & Kaliappan, M. (2015). Development of a secure routing protocol using game theory model in mobile ad hoc networks. IEEE Journal of Communications and Networks, 17(1), 75–83.CrossRef Paramasivan, B., Prakash, M. J. V., & Kaliappan, M. (2015). Development of a secure routing protocol using game theory model in mobile ad hoc networks. IEEE Journal of Communications and Networks, 17(1), 75–83.CrossRef
28.
Zurück zum Zitat Shen, H., & Li, Z. (2014). A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Transactions on Mobile Computing, 13(3), 693–708.CrossRef Shen, H., & Li, Z. (2014). A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Transactions on Mobile Computing, 13(3), 693–708.CrossRef
29.
Zurück zum Zitat Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 63(9), 4585–4593.CrossRef Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 63(9), 4585–4593.CrossRef
30.
Zurück zum Zitat Qin, Y., Huang, D., & Bing, Li. (2014). STARS: A statistical traffic pattern discovery system for MANETs. IEEE Transactions on Dependable and Secure Computing, 11(2), 181–192.CrossRef Qin, Y., Huang, D., & Bing, Li. (2014). STARS: A statistical traffic pattern discovery system for MANETs. IEEE Transactions on Dependable and Secure Computing, 11(2), 181–192.CrossRef
31.
Zurück zum Zitat Li, X., Liu, T., Liu, Y., & Tang, Y. (2014). Optimized multicast routing algorithm based on tree structure in MANETs. China Communications, 11(2), 90–99.CrossRef Li, X., Liu, T., Liu, Y., & Tang, Y. (2014). Optimized multicast routing algorithm based on tree structure in MANETs. China Communications, 11(2), 90–99.CrossRef
Metadaten
Titel
A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks
verfasst von
Gautam M. Borkar
A. R. Mahajan
Publikationsdatum
24.05.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2017
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1287-y

Weitere Artikel der Ausgabe 8/2017

Wireless Networks 8/2017 Zur Ausgabe

Neuer Inhalt