Abstract
A mobile ad hoc network (MANET) is a self-configurable network connected by wireless links. This type of network is only suitable for provisional communication links as it is infrastructure-less and there is no centralized control. Providing QoS and security aware routing is a challenging task in this type of network due to dynamic topology and limited resources. The main purpose of secure and trust based on-demand multipath routing is to find trust based secure route from source to destination which will satisfy two or more end to end QoS constraints. In this paper, the standard ad hoc on-demand multi-path distance vector protocol is extended as the base routing protocol to evaluate this model. The proposed mesh based multipath routing scheme to discover all possible secure paths using secure adjacent position trust verification protocol and better link optimal path find by the Dolphin Echolocation Algorithm for efficient communication in MANET. The performance analysis and numerical results show that our proposed routing protocol produces better packet delivery ratio, reduced packet delay, reduced overheads and provide security against vulnerabilities and attacks.
Similar content being viewed by others
References
Corson, M. S., Macker, P. J., & Cirincione, G. H. (1999). Internet-based mobile ad hoc networking. Internet Computing, IEEE, 3(4), 63–70.
Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 12(100), 3172–3186.
Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.
Azedine, B., El-Khatiba, K., Xua, L., & Korbab, L. (2005). An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Computer Communications, 28(10), 1193–1203.
Li, Wenjia, & Joshi, Anupam. (2008). Security issues in mobile ad hoc networks—A survey (pp. 1–23). Baltimore County: Department of Computer Science and Electrical Engineering, University of Maryland.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Yang, Hao, HaiyunLuo, Fan Ye, Songwu, Lu, & Zhang, Lixia. (2004). Security in mobile ad hoc networks: Challenges and solutions. Wireless Communications, IEEE, 11(1), 38–47.
Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on 2010 distributed computing systems workshops (ICDCSW) (pp. 52–61).
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.
Mohapatra, P., Li, J., & Gui, C. (2003). QoS in mobile ad hoc networks. IEEE Wireless Communications, 10(3), 44–53.
Wu, C., Zhang, F., & Yang, H. (2010). A novel QoS multipath path routing in MANET. International Journal of Digital Content Technology and its Applications, 4(3), 132–136.
Jiang, S., Liu, Y., Jiang, Y., & Yin, Q. (2004). Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE Journal on Selected Areas in Communications, 22(7), 1347–1356.
Wan, J., Liu, J., Shao, Z., Vasilakos, A. V., Imran, M., & Zhou, K. (2016). Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors, 16(1), 88.
Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. Mobile Computing, IEEE Transactions, 14(4), 742–754.
Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2011). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 30(52), 1.
Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security. IEEE Transactions, 10(3), 471–484.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.
Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.
Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions, 3, 436–450.
Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.
Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In 2010 IEEE 30th international conference distributed computing systems workshops (ICDCSW) (pp. 52–61).
Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.
He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Re Trust: Attack-resistant and lightweight trust management for medical sensor networks. Information Technology in Biomedicine, IEEE Transactions, 16(4), 623–632.
Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. Information Forensics and Security, IEEE Transactions, 10(6), 1299–1314.
Paramasivan, B., Prakash, M. J. V., & Kaliappan, M. (2015). Development of a secure routing protocol using game theory model in mobile ad hoc networks. IEEE Journal of Communications and Networks, 17(1), 75–83.
Shen, H., & Li, Z. (2014). A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Transactions on Mobile Computing, 13(3), 693–708.
Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 63(9), 4585–4593.
Qin, Y., Huang, D., & Bing, Li. (2014). STARS: A statistical traffic pattern discovery system for MANETs. IEEE Transactions on Dependable and Secure Computing, 11(2), 181–192.
Li, X., Liu, T., Liu, Y., & Tang, Y. (2014). Optimized multicast routing algorithm based on tree structure in MANETs. China Communications, 11(2), 90–99.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Borkar, G.M., Mahajan, A.R. A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wireless Netw 23, 2455–2472 (2017). https://doi.org/10.1007/s11276-016-1287-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-016-1287-y