Skip to main content
Log in

Robust and secure routing scheme for wireless multihop network

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Mobile ad hoc network (MANET) is an appealing technology that has attracted lots of research efforts. On-demand routing protocol such as AODV may suffer from frequent topological changes. Due to frequent communication failures, multipath MANET is preferred than single-path MANET in many applications as former is used for achieving robustness and load balancing and improving reliability. Although multipath MANET is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; MANETs are known to be particularly vulnerable to security attack. The paper presents a design of robust and secure framework for multipath MANET. In this paper, we propose not only a robust multipath routing protocol but also an extended security scheme. We discuss security analysis for proposed security scheme. And we also conduct simulation to evaluate such a framework through different performance metrics. Results show that the proposed routing protocol achieves better performance in terms of various metrics than other protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Perkins CE, Belding-Royer EM, Das S (2003) Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561

  2. Mueller S, Tsang RP, Ghosal D (2004) Multipath routing in mobile ad hoc networks: issues and challenges. In: Performance tools and applications to networked systems. LNCS, vol 2965, pp 209–234

  3. Kotzanikolaou P, Mavropodi R, Douligeris C (2005) Secure multi-path routing for mobile ad hoc networks. In: Proceedings of 2nd annual conference on wireless on-demand network systems and services (WONS 2005), Switzerland, pp 89–96

  4. Lee S-J, Gerla M (2001) Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of IEEE international conference on communications ICC’01, Helsinki, Finland, vol 3, pp 867–871

  5. Marina MK, Das SR (2006) Ad hoc on-demand multipath distance vector routing. Wiley Wireless Commun Mobile Comput 6(7):969–988

    Google Scholar 

  6. Ye Z, Krishnamurthy SV, Tripathi SK (2004) A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad Hoc Netw J 2(1):87–107

    Article  Google Scholar 

  7. Li X, Cuthbert L (2004) On-demand node-disjoint multipath routing in wireless ad hoc networks. In: Proceedings of IEEE conference on local computer networks (LCN 2004), Tampa, FL, USA, pp 419–420

  8. Lee S-J, Gerla M (2000) AODV-BR: backup routing in ad hoc networks. In: Proceedings of IEEE wireless communications and networking conference—WCNC 2000, vol 3. Chicago, IL, USA, pp 1311–1316

  9. Anjum F, Mouchtaris P (2007) Security for wireless ad hoc networks. Wiley, London

    Book  Google Scholar 

  10. Papadimitratos P, Haas ZJ (2002) Secure routing for mobile ad hoc networks. In: Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, USA

  11. Mavropodi R, Kotzanikolaoua P, Douligerisa C (2007) SecMR—a secure multipath routing protocol for ad hoc networks. Elsevier Ad Hoc Netw J 5:87–99

    Article  Google Scholar 

  12. Burmester M, Van Le T (2004) Secure multipath communication in mobile ad hoc networks. In: Proceedings of the international conference on information technology: coding and computing (ITCC’04), Las Vegas, USA, vol 2, pp 405–409

  13. Berton S, Yin H, Lin C, Min G (2006) Secure, disjoint, multipath source routing protocol (SDMSR) for mobile ad-hoc networks. In: Proceedings of the fifth international conference on grid and cooperative computing (GCC’06), pp 387–394

  14. Marshall J, Thakur V, Yasinsac A (2003) Identifying flaws in the secure routing protocol. In: Proceedings of 22nd IEEE international performance computing and communications conference IPCCC 2003, pp 167–174

  15. Reddy LR, Raghavan SV (2007) SMORT: scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Netw J 5(2):162–188

    Article  Google Scholar 

  16. Girault M (1991) Self-certified public keys. In: Proceedings of advances in cryptology: Eurocrypt’91. Springer, Heidelberg, pp 490–497

  17. Petersen H, Horster P (1997) Self-certified keys—concepts and application. In: Proceedings of international conference on communications and multimedia security (CMS’97), Chapman & Hall, London, pp 102–116

  18. Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30

    Article  Google Scholar 

  19. Desmedt YG (1994) Threshold cryptography. Eur Trans Telecommun 5(4):449–457

    MathSciNet  Google Scholar 

  20. Lee B, Kim K (2000) Self-certificate: PKI using self-certified key. In: Proceedings of conference on information security and cryptology CISC 2000, vol 10(1), pp 65–73

  21. Li Z, Garcia-Luna-Aceves JJ (2007) Non-interactive key establishment in mobile ad hoc networks. Elsevier Ad Hoc Netw J 5(7):1194–1203

    Article  Google Scholar 

  22. Araz O, Qi H (2006) Load-balanced key establishment methodologies in wireless sensor networks. Int J Secur Netw 1(3–4):158–166

    Article  Google Scholar 

  23. Dahill B, Levine BN, Royer E, Shields C (2001) A secure routing protocol for ad hoc networks. Technical report 01-37. University of Massachusetts, USA

  24. Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM (2005) Authenticated routing for ad hoc networks. IEEE J Sel Areas Commun 23(3):598–610

    Article  Google Scholar 

  25. Gupte S, Singhal M (2003) Secure routing in mobile wireless ad hoc networks. Elsevier Ad Hoc Netw J 1(1):151–174

    Article  Google Scholar 

  26. Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of 2003 ACM workshop on Wireless security (WiSe’03), pp 30–40

  27. OPNET Modeler Simulation Software. http://www.opnet.com

  28. Ammari HM (2007) A survey of current architectures for connecting wireless mobile ad hoc networks to the Internet. Wiley Int J Commun Syst 20(8):943–968

    Article  Google Scholar 

  29. Argyroudis PG, O’Mahony D (2005) Secure routing for mobile ad hoc networks. IEEE Commun Surv Tutorials 7(3):2–21

    Article  Google Scholar 

  30. Buttyan L, Vajda I (2004) Towards provable security for ad hoc routing protocols. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (SASN’04), Washington DC, pp 94–105

Download references

Acknowledgments

This study was supported (in part) by research funds from Chosun University 2007.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to SeungJo Han.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Vaidya, B., Yeo, SS., Choi, DY. et al. Robust and secure routing scheme for wireless multihop network. Pers Ubiquit Comput 13, 457–469 (2009). https://doi.org/10.1007/s00779-009-0220-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-009-0220-0

Keywords

Navigation