A Secured and Fault-Tolerant Multipath Routing Protocols for WMN

  • Paramjeet Rawat
  • Meenakshi Soam
  • Suraj Malik
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 250)


In recent years, Wireless Mesh Network (WMN) has become a compelling topic to many network researchers due to its simplicity in installation and robustness in operation. However, existing routing protocols designed for MANET can not work efficiently in WMN because backbone in WMN formed by Mesh Router has very low mobility and are not put under power and memory constraint. Even existing multipath routing protocols designed for WMN, do not consider all the issues of the network i.e. fault-tolerance, load-balancing, security, reliability etc. Each paper works on one or two issues of networking. In this paper, we basically tried to give solution to maximum problems of Wireless Mesh Networks rather than giving a solution to only one or two. Our work includes routing packets to the destination with minimum delay and minimum error rate considering security, congestion control and fault-tolerance so that it could be considered as a full proof protocol.


congestion-aware fault-tolerant load-balanced geographic multipath wireless mesh network 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ramanathan, R., Rosales-Hain, R.: Topology control of multihop wireless networks using transmit power adjustment, vol. 2 (2000)Google Scholar
  2. 2.
    Burkhart, M., Wattenhofer, R., Zollinger, A.: Does topology control reduce interference?, pp. 9–19. ACM Press, New York (2004)Google Scholar
  3. 3.
    Dai, F., Wu, J.: On constructing k-connected k-dominating set in wireless ad hoc and sensor networks. Journal of Parallel and Distributed Computing 66(7), 947–958 (2006)CrossRefzbMATHGoogle Scholar
  4. 4.
    Huang, Z., Shen, C.C.: Multibeam antenna-based topology control with directional power intensity for ad hoc networks. IEEE Transactions on Mobile Computing 5(5), 508–517 (2006)CrossRefGoogle Scholar
  5. 5.
    Wang, F., Thai, M., Li, Y., Du, D.Z.: Fault Tolerant Topology Control for All-to-One and One-to-All Communication in Wireless Networks. IEEE Transactions on Mobile Computing 7(3), 322–331 (2008)CrossRefGoogle Scholar
  6. 6.
    Burmester, M., van Le, T.: Secure multipath communication in mobile ad hoc networks. In: ITCC 2004. IEEE, Las Vegas (2004)Google Scholar
  7. 7.
    Weeks, M., Altun, G.: Efficient, Secure, Dynamic Source Routing for Ad-hoc Networks. Journal of Network and Systems Management 14(4), 559–581 (2006)CrossRefGoogle Scholar
  8. 8.
    Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile ad hoc networks. In: Proceedings of the WONSS 2005 Conference, St. Moritz, Switzerland, January 19-21, pp. 89–96. IEEE, Los Alamitos (2005)Google Scholar
  9. 9.
    Siddiqui, M.S., Amin, S.O., Hong, C.S.: On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network. In: Ata, S., Hong, C.S. (eds.) APNOMS 2007. LNCS, vol. 4773, pp. 466–475. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  10. 10.
    Gamer, T., Völker, L., Zitterbart, M.: Differentiated security in wireless mesh networks. Security and Communication Networks (2009); published online in wiley interscience Google Scholar
  11. 11.
    Elliptic Curve Cryptography Lecture Notes on Computer and Network Security by Avi Kak ( Scholar
  12. 12.
    Diffie, W., van Oorschot, P., Wiener, M.: Authentication and authenticated key exchange. Designs, Codes and Cryptography 2(2), 107–125 (1992)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Bedi, P.K., et al.: An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network. International Journal on Computer Science and Engineering (IJCSE) 3(5), 1757–1763 (2011)Google Scholar
  14. 14.
    Rawat, P., et al.: Integrated Security Framework For Hybrid Wireless Mesh Networks (IJCSE) International Journal on Computer Science and Engineering 2(4), 1136–1141 (2010)Google Scholar
  15. 15.
    The ns Manual, formerly ns Notes and DocumentationGoogle Scholar
  16. 16.
    Marina, M.K., Das, S.R.: On-demand Multi Path Distance Vector Routing in Ad Hoc Networks. In: Proceedings of IX International Conference on Network Protocols (2001)Google Scholar
  17. 17.
    A General Interference-Aware Framework for Joint Routing and Link Scheduling in Wireless Mesh Networks. IEEE Network (January-February 2008)Google Scholar
  18. 18.
    Choi, K.W., Jeon, W.S.: Efficient Load-Aware Routing Scheme for Wireless Mesh Networks. IEEE Transactions On Mobile Computing 9(9) (2010)Google Scholar
  19. 19.
    Koji, N., Ivan, M.Z.: Packet Routing in Wireless Mesh Networks. In: 10th Symposium on Neural (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Paramjeet Rawat
    • 1
  • Meenakshi Soam
    • 2
  • Suraj Malik
    • 1
  1. 1.Dept. of Computer ScienceIIMT Engg CollegeIndia
  2. 2.Dept. of Computer ScienceRGGI CollegeIndia

Personalised recommendations