Skip to main content
Log in

Towards more reliable and secure source routing in mobile ad hoc and sensor networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Routing protocols in mobile ad hoc and sensor networks discover a multi-hop route between source and destination nodes. A highly reliable path is an important component for enhancing the security of communication. This paper presents RAS: a Reliable routing protocol for enhanced reliability and security of communication in mobile Ad hoc and Sensor networks. Enhanced reliability and security are achieved by the maintenance of a reliability factor by the nodes, which is increased when nodes participate successfully in data transmissions. This is determined through the use of positive and passive acknowledgements. Additional optimizations are included in order to increase the efficiency and performance of the network. Simulation experiments are performed in order to verify the operation of the proposed protocol and evaluate its performance. The results show an improvement in the reliability of the discovered path with the proper choice of certain important reliability parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Perkins, C. E. (2001). Ad hoc networking. Upper Saddle River: Addison-Wesley.

    Google Scholar 

  2. Perkins, C. E., & Royer, E. M. (1998). Ad hoc on demand distance vector (AODV) routing. Internet Draft.

  3. Park, V. D., & Corson, M. S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings IEEE INFOCOM ’97. Sixteenth annual joint conference of the IEEE computer and communications societies, April 1997 (Vol. 3, pp. 1405–1413).

    Google Scholar 

  4. Barry, M., & McGrath, S. (2003). QoS techniques in ad hoc networks. In Proc. of 1st international ANWIRE workshop, Glasgow, April 2003.

    Google Scholar 

  5. Cartigny, J., & Simplot, D. (2003). Border node retransmission based probabilistic broadcast protocols in ad-hoc networks. Telecommunications Systems, 22, 189–204.

    Article  Google Scholar 

  6. Jawhar, I., & Wu, J. (2005). QoS support in TDMA-based mobile ad hoc networks. Journal of Computer Science and Technology, 20(6), 797–910.

    Article  Google Scholar 

  7. Jawhar, I., & Wu, J. (2005). Quality of service routing in mobile ad hoc networks. In M. Cardei, I. Cardei, & D.-Z. Du (Eds.), Theory and applications: Vol. 16. Resource management in wireless networking (pp. 365–400). Berlin: Springer.

    Chapter  Google Scholar 

  8. Jawhar, I., & Wu, J. (2006). Resource allocation in wireless networks using directional antennas. In The fourth IEEE international conference on pervasive computing and communications (PerCom-06), Pisa, Italy, March 2006 (pp. 318–327). Los Alamitos: IEEE Computer Society.

    Chapter  Google Scholar 

  9. Liao, W.-H., Wang, S.-L., Sheu, J.-P., & Tseng, Y.-C. (2002). A multi-path QoS routing protocol in a wireless mobile ad hoc network. Telecommunications Systems, 19(3–4), 329–347.

    Article  Google Scholar 

  10. Nelakuditi, S., Zhang, Z.-L., Tsang, R. P., & Du, D. H. C. (2002). Adaptive proportional routing: a localized QoS routing approach. IEEE/ACM Transactions on Networking, 10(6), 790–804.

    Article  Google Scholar 

  11. Wu, J. (2001). A dominating-set-based routing scheme in ad hoc wireless networks. Telecommunications Systems, 18, 13–36. A special issue on wireless networks.

    Article  Google Scholar 

  12. Wu, J. (2003). An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunications Systems, 22, 61–75. A special issue on wireless networks and mobile computing.

    Article  Google Scholar 

  13. Sundaresan, K., Anantharaman, V., Hsieh, H.-Y., & Sivakumar, R. (2005). A reliable transport protocol for ad hoc networks. IEEE Transactions on Mobile Computing, 4(6), 588–603.

    Article  Google Scholar 

  14. Hadim, S., Al-Jaroodi, J., & Mohamed, N. (2006). Trends in middleware for mobile ad hoc networks. The Journal of Communications, 1(4), 11–21.

    Article  Google Scholar 

  15. Ma, R., & Ilow, J. (2003). Reliable multipath routing with fixed delays in Manet using regenerating nodes. In Proc. 28th IEEE international conference on local computer networks (LNC’03), Bonn, Germany, October 2003 (pp. 719–725)

    Google Scholar 

  16. Leung, R., Liu, J., Poon, E., Chan, A.-L., & Li, B. (2001). Mp-dsr: a qos-aware multi-path dynamic source routing protocol for wireless ad-hoc networks. In Proc. 26th IEEE conference on local computer networks (LCN 2001) (pp. 132–141).

    Google Scholar 

  17. Chen, W.-P., & Hou, J. C. (2002). Dynamic, ad-hoc source routing with connection-aware link-state exchange and differentiation. In Proc. IEEE Globecom, November 2002.

    Google Scholar 

  18. Anantvalee, T., & Wu, J. (2007). Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In Proc. of IEEE ICC.

    Google Scholar 

  19. Jamal N., A.-K., & Kamal, A. E. (2006). Enforcing cooperation in mobile ad hoc networks. Wireless Personal Communications.

  20. Rebahi, Y., Mujica-V, V. E., & Sisalem, D. (2005). A reputation-based trust mechanism for ad hoc networks. In Proc. 10th IEEE symposium on computers and communications (ISCC 2005), Spain, June 2005 (pp. 37–42).

    Chapter  Google Scholar 

  21. Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. In Proc. IEEE semiannual vehicular technology conference, September 2002 (Vol. VTC-2002).

    Google Scholar 

  22. Kargl, F., Gei, A., Schlott, S., & Weber, M. (2005). Secure dynamic source routing. In Proceedings of the 38th Hawaii international conference on system sciences.

    Google Scholar 

  23. Tsao, T., Alexander, R., Dohler, M., Daza, V., & Lozano, A. (2010). A security framework for routing over low power and lossy networks. IETF draft, draft-tsao-roll-security-framework-02.

  24. Pirzada, A. A., & McDonald, C. (2005). Secure routing with aodv protocol. In Asia-Pacific conference on communications, Perth, Western Australia, October 2005.

    Google Scholar 

  25. Hu, Y.-C., Johnson, D. B., & Perrig, A. (2002). Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings of the 4th IEEE workshop on mobile computing systems and applications (WMCSA’02), June 2002 (pp. 3–13).

    Google Scholar 

  26. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2002). A secure on-demand routing protocol for wireless ad hoc networks. In Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom 2002), September 2002 (pp. 12–23).

    Google Scholar 

  27. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. (2002). A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE international conference on network protocols (ICNP’02), November 2002 (pp. 78–87).

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by UAE University Research grant 04-03-9-11/09.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imad Jawhar.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jawhar, I., Trabelsi, Z. & Al-Jaroodi, J. Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommun Syst 55, 81–91 (2014). https://doi.org/10.1007/s11235-013-9753-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9753-7

Keywords

Navigation