Skip to main content

Advertisement

Log in

T-TOHIP: Trust-based topology-hiding multipath routing in mobile ad hoc network

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

In recent years, security in mobile ad hoc network (MANET) is the active research topic in both industry and academia because of the rising availability of tiny, adapted mobile devices, and the multipath routing protocols have been received much attention in MANET. Accordingly, this paper introduces the trust-based topology-hiding multipath routing algorithm for the MANET. The proposed model finds the security factor of each node in the MANET, and the neighbor nodes are selected based on the defined security factor. The proposed routing method has four models for defining the security factor, namely the trusted model, energy model, delay model, and the mobility model. The proposed multipath routing determines the secured route between the sender and receiver based on the selected neighbor nodes. Finally, data communication is performed through the selected multipath. The performance of the proposed multipath routing is analyzed with the existing methods, such as topology-hiding multipath routing protocol, Fractional lion optimization to topology-hiding multi-path routing, and Adaptive Fractional lion optimization to topology-hiding multi-path routing for the performance metrics, such as throughput, delay, energy, and packet drop rate (PDR). Simulation results show that the proposed multipath routing has the better values of 0.330566, 0.376754, 0.319369, and 0.380559 after 50 s of simulation for throughput, delay, energy, and PDR than the existing models when there is an attack on the node.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Abbreviations

MANET:

Mobile ad-hoc network

T-TOHIP:

Trust-based topology-hiding multipath routing

NDE-MR:

Node disjoint energy-efficient multipath routing

EA-AOMDV:

Energy-aware ad hoc on-demand multipath distance vector

TOHIP:

Topology-hiding multipath routing protocol

FL-TOHIP:

Fractional lion optimization to topology-hiding multi-path routing

AFL-TOHIP:

Adaptive fractional lion optimization to topology-hiding multi-path routing

PDR:

Packet drop rate

THMR:

Multipath routing protocol with the topology hiding

E2E-LREEMR:

End-to-end link reliable energy efficient multipath routing

PKI:

Public key infrastructure

ETC:

Expected transmission count

RREQ:

Route request packet

RREP:

Route reply

References

  1. Russia S, Anita R (2017) Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel Netw 23(7):2307–2316

    Article  Google Scholar 

  2. Kok GX, Chow CO, Xu YH, Ishii H (2013) EAOMDV-MIMC: a multipath routing protocol for multi-interface multi-channel mobile ad-hoc networks. Wirel Pers Commun 73(3):477–504

    Article  Google Scholar 

  3. Chen S, Wu M (2011) Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. J Syst Eng Electron 22(3):519–527

    Article  Google Scholar 

  4. Kim S (2012) An ant-based multipath routing algorithm for QoS aware mobile ad hoc networks. Wirel Pers Commun 66:739–749

    Article  Google Scholar 

  5. Chintalapalli RM, Ananthula VR (2018) M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network. IET Commun 12(12):1406–1415

    Article  Google Scholar 

  6. Mukhedkar M, Kolekar UD (2017) Implementation of real time secure routing protocol for mobile ad HOC network and AES for disaster affected area. In: Proceedings of the international conference on computing methodologies and communication (ICCMC), pp. 491–496

  7. Shaker Hothefa, Alsaqour Raed (2015) Multipath routing algorithm using an electromagnetic-like mechanism with threshold acceptance for mobile ad hoc networks. Wirel Pers Commun 81(2):607–630

    Article  Google Scholar 

  8. Sheikhan Mansour, Hemmati Ehsan (2012) Transient chaotic neural network-based disjoint multipath routing for mobile ad-hoc networks. Neural Comput Appl 21(6):1403–1412

    Article  Google Scholar 

  9. Muthusenthil B, Murugavalli S (2014) The impact of location based attacks on geographical routing protocols. J Theor Appl Inf Technol 60(2):189–199

    Google Scholar 

  10. Mallapur SV, Patil SR, Agarkhed JV (2017) Load balancing technique for congestion control multipath routing protocol in MANETs. Wirel Pers Commun 92(2):749–770

    Article  Google Scholar 

  11. Das I, Lobiyal DK, Katti CP (2016) Multipath routing in mobile ad hoc network with probabilistic splitting of traffic. Wirel Netw 22(7):2287–2298

    Article  Google Scholar 

  12. Zhang Yujun, Yan Tan, Tian Jie, Hua Qi, Wangb Guiling, Li Zhongcheng (2014) TOHIP: a topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Hoc Netw 21:109–122

    Article  Google Scholar 

  13. Zhang Y, Wang G, Hu Q, Li Z, Tian J (2012) Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE conference on INFOCOM, Orlando, FL, USA, 25–30 March, pp 10–18

  14. Nguyen Dang Quan, Toulgoat Mylène, Lamont Louise (2016) Impact of trust-based security association and mobility on the delay metric in MANET. J Commun Netw 18(1):105–111

    Article  Google Scholar 

  15. Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6(2):77–83

    Article  Google Scholar 

  16. Omar M, Challal Y, Bouabdallah A (2012) Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J Netw Comput Appl 35(1):268–286

    Article  Google Scholar 

  17. Huang JW, Woungang I, Chao HC, Obaidat MS (2011) Multi-path trust-based secure AOMDV routing in ad hoc networks. In: Proceedings of the IEEE conference on global telecommunications (GLOBECOM), Kathmandu, Nepal, 5–9 December

  18. Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180

    Article  Google Scholar 

  19. Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232

    Article  Google Scholar 

  20. Basurra SS, De Vos M, Padget J, Ji Y, Lewis T, Armour S (2015) Energy efficient zone based routing protocol for MANETs. Ad Hoc Netw 25(Part A):16–37

    Article  Google Scholar 

  21. Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472

    Article  Google Scholar 

  22. Kokilamani M, Karthikeyan E (2017) An optimal path selection criterion in multi path routing using energy. CSI Trans ICT 5(3):235–246

    Article  Google Scholar 

  23. Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput PP(99):1

    Google Scholar 

  24. Periyasamy P, Karthikeyan E (2017) End-to-end link reliable energy efficient multipath routing for mobile ad hoc networks. Wirel Pers Commun 92(3):825–841

    Article  Google Scholar 

  25. Raj TN, Saranya S, Murugan SA, Bhuvaneswari G (2012) Secured multi path routing with trust establishment using mobile ad hoc networks. Int J Sci Eng Res 3(1):130–134

    Google Scholar 

  26. Shyamala CK, Ashok N, Narayanan B (2015) Trust-based multi-path security scheme for Ad-hoc networks. Int J Comput Technol Appl 8(5):1735–1742

    Google Scholar 

  27. Rajeshwar J, Narsimha G (2017) Secure way routing protocol for mobile ad hoc network. Wirel netw 23(2):345–354

    Article  Google Scholar 

  28. Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Netw Appl 10(4):897–909

    Article  Google Scholar 

  29. Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2(5):483–502

    Article  Google Scholar 

  30. Ambekar RK, Kolekar UD (2017) FL-TOHIP: fractional lion optimization to topology-hiding multi-path routing in mobile ad hoc network. J Intell Syst

  31. Ambekar RK, Kolekar UD (2017) AFL-TOHIP: adaptive fractional lion optimization to topology-hiding multi-path routing in mobile ad hoc network. In: Proceedings of international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017), Palladam, India, pp 10–11

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rahul K. Ambekar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ambekar, R.K., Kolekar, U.D. T-TOHIP: Trust-based topology-hiding multipath routing in mobile ad hoc network. Evol. Intel. 15, 1067–1081 (2022). https://doi.org/10.1007/s12065-019-00280-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-019-00280-z

Keywords

Navigation