Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network

  • Rabindra Kumar Shial
  • K. Hemant Kumar Reddy
  • Bhabani Sankar Gouda
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)

Abstract

A mobile ad-hoc network (MANET) is a contemporarily positioned in wireless network where A mobile ad-hoc network (MANET) is a contemporarily positioned in wireless network where nodes able to interact with each other without forming any frame such as access points or base stations. Nodes can unite and split the network at their convenience and they are free to move randomly. Nodes can even organize themselves randomly. This is a resistant of the changeable behavior of MANET, it is possible that there could be little malicious and selfish nodes that try conciliating the efficiency of the routing protocol and construct MANET defenseless to security assail. Therefore an any armed security-motivated AODV (Ad hoc On-demand Distance Vector Routing) routing protocol devised as R-AODV (Reliant Ad hoc On-demand Distance Vector Routing). The accomplishment of this work is tailored and relied on trusted mechanism known as direct and recommendations trust model which is integrated into AODV. This consents the AODV for discovering a shortest path along with its highest degree of reliability. The diversely designed modus operandi restricts the data to go through malicious nodes that intend to avert. The R-AODV protocol has been implemented and simulated on NS-2. Based on the simulation consequences, it can be shown that R-AODV does offer a steadfast data hopping in context to the customary AODV if there are malicious nodes in the MANET.

Keywords

Trust mobile ad-hoc network routing protocol. Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Asokan, R., Natarajan, A.M., Venkatesh, C.: Ant based dynamic source routing protocol to support multiple quality of service (QoS) metrics in mobile ad hoc networks. International Journal of Computer Science and Security 2(3), 48–56 (2008)Google Scholar
  2. 2.
    Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 24(4) (1994)Google Scholar
  3. 3.
    Jacquet, P., et al.: Optimized link state routing protocol for ad hoc networks. In: Proceedings. IEEE International Technology for the 21st Century Multi Topic Conference, IEEE INMIC 2001. IEEE (2001)Google Scholar
  4. 4.
    Gouda, B.S., Shial, R.K., Reddy, K.H.K.: An optimal path finding routing protocol for mobile Ad-Hoc network using random mobility model. In: Emerging Trends in Science, Engineering and Technology, INCOSET (2012)Google Scholar
  5. 5.
    Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. International Series in Engineering and Computer Science, pp. 153–179 (1996)Google Scholar
  6. 6.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 1999. IEEE (1999)Google Scholar
  7. 7.
    Park, V.D., Corson, M.S.: A highly adaptive distributed routing algorithm for mobile wireless networks. In: Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1997, vol. 3. IEEE (1997)Google Scholar
  8. 8.
    Ko, Y.-B., Vaidya, N.H.: Location-Aided Routing (LAR) in mobile ad hoc networks. Wireless Networks 6(4), 307–321 (2000)CrossRefMATHGoogle Scholar
  9. 9.
    Pirzada, A., McDonald, C.: Reliable routing in ad hoc networks using direct trust mechanisms. In: Cheng, M., Li, D. (eds.) Advances in Wireless Ad Hoc and Sensor Networks, pp. 133–159 (2008)Google Scholar
  10. 10.
    Guang, L., Assi, C.: Vulnerabilities of ad hoc network routing protocols to MAC misbehavior. In: IEEE International Conference on Wireless And Mobile Computing, Networking And Communications (WiMob 2005), vol. 3. IEEE (2005)Google Scholar
  11. 11.
    Tamilselvan, L., Sankaranarayanan, V.: Prevention of impersonation attack in wireless mobile ad hoc networks. International Journal of Computer Science and Network Security (IJCSNS) 7(3), 118–123 (2007)Google Scholar
  12. 12.
    Fall, K., Vardhan, K. (eds.): Ns notes and documentation (1999), http://wwwmash.cd.berkeley.edu/ns/
  13. 13.
    Borgia, E., Anastasi, G., Conti, M., Gregori, E.: IEEE 802.11 ad hoc networks: protocols, performance and open issues. In: Basagni, S., Conti, M., Giordano, S., Stojmenvoic, I. (eds.) Ad hoc Networking. IEEE Press, Wiley, New York (2003)Google Scholar
  14. 14.
    Anastasi, G., Borgia, E., Conti, M., Gregori, E.: IEEE 802.11 ad hoc networks: performance measurements, icdcsw. In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW 2003), p. 758 (2003)Google Scholar
  15. 15.
    IEEE, Wireless LAN Medium Access Control (MAC) and Physical layer (PHY) Specifications. IEEE Std. 802.11 (1997)Google Scholar
  16. 16.
    A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks. PhD thesis, Department of Computer Science and Engineering, The Chinese University of Hong Kong, http://www.cse.cuhk.edu.hk/lyu/student/phd/gigi/term4/

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Rabindra Kumar Shial
    • 1
  • K. Hemant Kumar Reddy
    • 1
  • Bhabani Sankar Gouda
    • 1
  1. 1.Department of CSENational Institute of Science and TechnologyBrahmapurIndia

Personalised recommendations