Multipath Routing Protocols for Mobile Ad Hoc Networks: Security Issues and Performance Evaluation

  • Rosa Mavropodi
  • Christos Douligeris
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3854)


The evolution of wireless network technologies and mobile computing hardware made possible the introduction of various applications in mobile ad hoc networks. These applications have increased requirements regarding security and the acceptable delays in order to provide high quality services. Multipath routing protocols were designed to address these challenges. With the use of multiple paths for the communication between a source and a destination, the autonomic user becomes almost unaware of a possible network failure, due to security attacks or link collapses. Several secure multipath routing protocols have been proposed but little performance information and extensive comparisons are available. In this paper, we briefly describe some security issues that multipath routing protocols face and we evaluate the performance of three existing secure routing protocols under different traffic conditions and mobility patterns.


Data Packet Intermediate Node Malicious Node Route Discovery Interarrival Time 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Burmester, M., Desmedt, Y.: Secure communication in an unknown network using certificates. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 274–287. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  2. 2.
    Burmester, M., van Le, T.: Secure multipath communication in mobile ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas. IEEE, Los Alamitos (2004)Google Scholar
  3. 3.
    Koh, G., Oh, D., Woo, H.: A graph-based approach to compute multiple paths in mobile ad hoc networks. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 3201–3205. Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile ad hoc networks. In: Proceedings of the WONSS 2005 Conference, St. Moritz, Switzerland, January 19-21, 2005, pp. 89–96. IEEE, Los Alamitos (2005)Google Scholar
  5. 5.
    Lee, S.-J., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of ICC 2001, Helsinki, Finland, pp. 3201–3205. IEEE, Los Alamitos (2001)Google Scholar
  6. 6.
    Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review 6(3) (2002)Google Scholar
  7. 7.
    Nasipuri, A., Das, S.R.: On-demand multipath routing for mobile ad hoc networks. In: Proceedings of IEEE INFOCOM 1999, pp. 64–70 (1999)Google Scholar
  8. 8.
    Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), TX, San Antonio (January 2002)Google Scholar
  9. 9.
    Subramanian, A.P., Anto, A.J., Vasudevan, J., Narayanasamy, P.: Multipath power sensitive routing protocol for mobile ad hoc networks. In: Battiti, R., Conti, M., Cigno, R.L. (eds.) WONS 2004. LNCS, vol. 2928, pp. 171–183. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Tsirigos, A., Haas, Z.J.: Multipath routing in the presence of frequent topological changes. IEEE Communications Magazine 39(11), 132–138 (2001)CrossRefGoogle Scholar
  11. 11.
    Wu, J.: An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunication Systems 22(1-4), 61–75 (2003)CrossRefGoogle Scholar
  12. 12.
    Johnson, D., Maltz, D.: Dynamic source routing in ad-hoc wireless networks. In: Mobile Computing, pp. 152–181. Kluwer Academic Publishers, Dordrecht (1996)Google Scholar
  13. 13.
    Haas, Z.J., Perlman, M.: The performance of query control schemes for zone routing protocol. In: Proc. of SIGCOMM 1998 (1998)Google Scholar
  14. 14.
    Perkins, C., Royer, E., Das, S.: Ad hoc on-demand distance vector routing. In: Proc. of IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100. IEEE, Los Alamitos (1999)Google Scholar
  15. 15.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of the 6th MobiCom Conference. ACM, New York (2000)Google Scholar
  16. 16.
    Yang, H., Meng, X., Lu, S.: Self-organized network-layer security in mobile ad hoc networks. In: Proc. of the ACM workshop on Wireless security, Atlanta, GA, pp. 11–20. ACM, New York (2002)CrossRefGoogle Scholar
  17. 17.
    Yi, S., Naldurg, P., Kravets, R.: Security-aware ad-hoc routing for wireless networks, Technical Report, UIUCDCS-R-2001-2241 (June 2001)Google Scholar
  18. 18.
    Buttyan, L., Hubaux, J.P.: Enforcing service availability in mobile ad hoc WANs. In: Proc. of the 1st MobiHoc Conference, BA, Massachusetts (August 2000)Google Scholar
  19. 19.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Rosa Mavropodi
    • 1
  • Christos Douligeris
    • 1
  1. 1.Department of InformaticsUniversity of PiraeusPiraeusGreece

Personalised recommendations