Skip to main content
Log in

A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

A mobile ad hoc network (MANET) is a self-configurable network connected by wireless links. This type of network is only suitable for provisional communication links as it is infrastructure-less and there is no centralized control. Providing QoS and security aware routing is a challenging task in this type of network due to dynamic topology and limited resources. The main purpose of secure and trust based on-demand multipath routing is to find trust based secure route from source to destination which will satisfy two or more end to end QoS constraints. In this paper, the standard ad hoc on-demand multi-path distance vector protocol is extended as the base routing protocol to evaluate this model. The proposed mesh based multipath routing scheme to discover all possible secure paths using secure adjacent position trust verification protocol and better link optimal path find by the Dolphin Echolocation Algorithm for efficient communication in MANET. The performance analysis and numerical results show that our proposed routing protocol produces better packet delivery ratio, reduced packet delay, reduced overheads and provide security against vulnerabilities and attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Corson, M. S., Macker, P. J., & Cirincione, G. H. (1999). Internet-based mobile ad hoc networking. Internet Computing, IEEE, 3(4), 63–70.

    Article  Google Scholar 

  2. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 12(100), 3172–3186.

    Article  Google Scholar 

  3. Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140.

    Article  Google Scholar 

  4. Azedine, B., El-Khatiba, K., Xua, L., & Korbab, L. (2005). An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Computer Communications, 28(10), 1193–1203.

    Article  Google Scholar 

  5. Li, Wenjia, & Joshi, Anupam. (2008). Security issues in mobile ad hoc networks—A survey (pp. 1–23). Baltimore County: Department of Computer Science and Electrical Engineering, University of Maryland.

    Google Scholar 

  6. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  7. Yang, Hao, HaiyunLuo, Fan Ye, Songwu, Lu, & Zhang, Lixia. (2004). Security in mobile ad hoc networks: Challenges and solutions. Wireless Communications, IEEE, 11(1), 38–47.

    Article  Google Scholar 

  8. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on 2010 distributed computing systems workshops (ICDCSW) (pp. 52–61).

  9. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), 70–75.

    Article  Google Scholar 

  10. Mohapatra, P., Li, J., & Gui, C. (2003). QoS in mobile ad hoc networks. IEEE Wireless Communications, 10(3), 44–53.

    Article  Google Scholar 

  11. Wu, C., Zhang, F., & Yang, H. (2010). A novel QoS multipath path routing in MANET. International Journal of Digital Content Technology and its Applications, 4(3), 132–136.

    Article  Google Scholar 

  12. Jiang, S., Liu, Y., Jiang, Y., & Yin, Q. (2004). Provisioning of adaptability to variable topologies for routing schemes in MANETs. IEEE Journal on Selected Areas in Communications, 22(7), 1347–1356.

    Article  Google Scholar 

  13. Wan, J., Liu, J., Shao, Z., Vasilakos, A. V., Imran, M., & Zhou, K. (2016). Mobile crowd sensing for traffic prediction in internet of vehicles. Sensors, 16(1), 88.

    Article  Google Scholar 

  14. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.

    Google Scholar 

  15. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. Mobile Computing, IEEE Transactions, 14(4), 742–754.

    Article  Google Scholar 

  16. Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2011). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.

    Google Scholar 

  17. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 30(52), 1.

    Article  Google Scholar 

  18. Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security. IEEE Transactions, 10(3), 471–484.

    Google Scholar 

  19. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.

    Article  Google Scholar 

  20. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  21. Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions, 3, 436–450.

    Article  Google Scholar 

  22. Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.

    Article  Google Scholar 

  23. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In 2010 IEEE 30th international conference distributed computing systems workshops (ICDCSW) (pp. 52–61).

  24. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.

    Article  Google Scholar 

  25. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Re Trust: Attack-resistant and lightweight trust management for medical sensor networks. Information Technology in Biomedicine, IEEE Transactions, 16(4), 623–632.

    Article  Google Scholar 

  26. Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. Information Forensics and Security, IEEE Transactions, 10(6), 1299–1314.

    Article  Google Scholar 

  27. Paramasivan, B., Prakash, M. J. V., & Kaliappan, M. (2015). Development of a secure routing protocol using game theory model in mobile ad hoc networks. IEEE Journal of Communications and Networks, 17(1), 75–83.

    Article  Google Scholar 

  28. Shen, H., & Li, Z. (2014). A QoS-oriented distributed routing protocol for hybrid wireless networks. IEEE Transactions on Mobile Computing, 13(3), 693–708.

    Article  Google Scholar 

  29. Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 63(9), 4585–4593.

    Article  Google Scholar 

  30. Qin, Y., Huang, D., & Bing, Li. (2014). STARS: A statistical traffic pattern discovery system for MANETs. IEEE Transactions on Dependable and Secure Computing, 11(2), 181–192.

    Article  Google Scholar 

  31. Li, X., Liu, T., Liu, Y., & Tang, Y. (2014). Optimized multicast routing algorithm based on tree structure in MANETs. China Communications, 11(2), 90–99.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gautam M. Borkar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Borkar, G.M., Mahajan, A.R. A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wireless Netw 23, 2455–2472 (2017). https://doi.org/10.1007/s11276-016-1287-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1287-y

Keywords

Navigation