Open Access   Article Go Back

A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks

Y. Vasudeva Reddy1 , M. Nagendra2

  1. Computer Science, Rayalaseema University, Kurnool, India.
  2. Computer Science and Technology, Sri Krishnadevaraya University, Ananthapuramu, India.

Correspondence should be addressed to: yvr.gpr@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 243-248, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i12.243248

Online published on Dec 31, 2017

Copyright © Y. Vasudeva Reddy, M. Nagendra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Y. Vasudeva Reddy, M. Nagendra, “A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.243-248, 2017.

MLA Style Citation: Y. Vasudeva Reddy, M. Nagendra "A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 5.12 (2017): 243-248.

APA Style Citation: Y. Vasudeva Reddy, M. Nagendra, (2017). A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 5(12), 243-248.

BibTex Style Citation:
@article{Reddy_2017,
author = {Y. Vasudeva Reddy, M. Nagendra},
title = {A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {243-248},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1610},
doi = {https://doi.org/10.26438/ijcse/v5i12.243248}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i12.243248}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1610
TI - A Study on Multipath Routing Security Protocols for Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Y. Vasudeva Reddy, M. Nagendra
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 243-248
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
653 384 downloads 250 downloads
  
  
           

Abstract

Mobile ad hoc network (MANET) is a multi-hop wireless network that requires no infrastructure. The major issue in developing the routing protocols for the MANETs is their dynamic topology. The traditional single path routing protocols are not efficient for secure communication. Multipath routing protocols provide higher throughput and security than uni-path routing protocols in MANETs. The objective of the paper is to study various security attacks relevant to multipath routing in MANET which helps in developing a reliable, secure multipath routing protocol with significant performance in MANETs.

Key-Words / Index Term

MANET, multipath routing, security, performance

References

[1] S. Sarkar and R. Datta, “A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks,” Ad Hoc Networks, vol. 37, pp. 209–227, Feb. 2016.
[2] P. K. Manohari and N. Ray, “Multipath routing protocols in MANETs: A study,” in 2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, 2016, pp. 91–96.
[3] P. K. Manohari and N. K. Ray, “EAOMDV: An energy efficient multipath routing protocol for MANET,” in 2015 IEEE Power, Communication and Information Technology Conference, PCITC 2015 - Proceedings, 2016, pp. 710–715.
[4] B. Rajkumar and G. Narsimha, “Secure Multipath Routing and Data Transmission in MANET,” Int. J. Netw. Virtual Organ., vol. 16, no. 3, pp. 236–252, 2016.
[5] P. R. and R. N., “An improved multipath MANET routing using link estimation and swarm intelligence,” EURASIP Journal on Wireless Communications and Networking, vol. 2015, no. 1, p. 173, Dec. 2015.
[6] Y. V. R. and M. N. G Vijaya Kumar, “Current Research Work on Routing Protocols for MANET : A Literature Survey,” International Journal on Computer Science and Engineering (IJCSE), vol. 2, no. 3, pp. 706–713, 2010.
[7] C. E. Perkins and P. Bhagwat, “Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers,” ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 234–244, 1994.
[8] S. Murthy and J. J. Garcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” Mobile Networks and Applications, vol. 1, no. 2, pp. 183–197, 1996.
[9] W. Liu, C. Chiang, H. Wu, and C. Gerla, “Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel,” in Proc. IEEE SICON’97, 1997, pp. 197–211.
[10] T. W. Chen and M. Gerla, “Global state routing: A new routing scheme for ad-hoc wireless networks,” in International Conference on Communications - Proceedings, 1998, vol. 1, pp. 171–175.
[11] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, “Scalable routing strategies for ad hoc wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1369–1379, 1999.
[12] M. Joa-Ng and I. T. Lu, “A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1415–1425, 1999.
[13] G. Pei, M. Gerla, and X. Hong, “LANMAR: Landmark routing for large scale wireless Ad Hoc Networks with group mobility,” in 2000 1st Annual Workshop on Mobile and Ad Hoc Networking and Computing, MobiHOC 2000, 2000, pp. 11–18.
[14] P. Jacquet, P. Mühlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, “Optimized link state routing protocol for ad hoc networks,” 5th IEEE Multi Topic Conference (INMIC 2001), p. 62, 2001.
[15] C.-K. Toh, “A Novel Distributed Routing Protocol To Support Ad-Hoc Mobile Computing,” in Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, 1996, pp. 480–486.
[16] R. Dube, C. D. Rais, K. Y. Wang, and S. K. Tripathi, “Signal stability-based adaptive routing (SSA) for ad hoc mobile networks,” IEEE Personal Communications, vol. 4, no. 1, pp. 36–45, 1997.
[17] V. Park and M. Corson, “A highly adaptive distributed routing algorithm for mobile wireless networks,” … Annual Joint Conference of the IEEE …, pp. 1405–1413, 1997.
[18] T. Y. Jiang M, Li J, “Cluster Based Routing Protocol (CBRP),” IETF Draft, 1999. [Online]. Available: https://tools.ietf.org/wg/manet/draft-ietf-manet-cbrp-spec/. [Accessed: 25-Aug-2017].
[19] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, vol. 353, pp. 153–181, 1996.
[20] C. Perkings, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Ietf Rfc 3561, pp. 1–37, 2003.
[21] A. B. McDonald and T. Znati, “A dual-hybrid adaptive routing strategy for wireless ad hoc networks,” in 2000 IEEE Wireless Communications and Networking Conference, 2000, vol. 3, pp. 1125–1130.
[22] R. V. Boppana and S. P. Konduru, “An adaptive distance vector routing algorithm for mobile, ad hoc networks,” in Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), 2001, vol. 3, pp. 1753–1762.
[23] Z. J. Haas, M. R. Pearlman, and P. Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” draftietfmanetzonezrp02 txt. p. 11, 2002.
[24] V. Ramasubramanian, Z. J. Haas, and E. G. Sirer, “SHARP: A hybrid adaptive routing protocol for mobile ad hoc networks,” in Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, 2003, pp. 303–314.
[25] A.-S. K. Pathan, M. M. Alam, M. M. Monowar, and M. F. Rabbi, “An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting,” E-Tech 2004: An International Multi-Topic Conference, pp. 97–100, 2004.
[26] L. X. and L. Cuthbert, “On- demand node-disjoint multipath routing in wireless ad hoc networks,” in In 29th Annual IEEE International Conference on Local Computer Networks, 2004, pp. 419–420.
[27] L. X. and L. Cuthbert, “Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks,” in Proceedings of the IEEE Computer Society’s 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004, pp. 184–191.
[28] S. Lal, Chhagan, Vijay Laxmi, Manoj Gaur, “A node-disjoint multipath routing method based on AODV protocol for MANETs,” in IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), 2012, pp. 399–405.
[29] S. Lee and M. Gerla, “Split multipath routing with maximally disjoint paths in ad hoc networks,” in Proceedings of the IEEE ICC, 2001, pp. 3201–3205.
[30] A. Nasipuri and S.R. Das, “On-Demand Multipath Routing for Mobile Ad Hoc Networks,” in Proceedings of IEEE ICCCN’99, 1999, pp. 64–70.
[31] R. B. I. Saritha Reddy Venna, “A survey on security in mobile ad hoc networks,” International Journal of Computer Science and Information Technologies (IJCSIT), vol. 7, no. 1, pp. 135–140, 2016.
[32] K. P. Manikandan, R. Satyaprasad, and K. Rajasekhararao, “A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks,” International Journal of Advanced Computer Science and Applications, vol. 2, no. 3, pp. 7–12, 2011.
[33] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, “Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks,” Wired/ Wireless Internet Communications, Proceedings, vol. 3510, pp. 269–278, 2005.
[34] P. Kotzanikolaou, R. Mavropodi, and C. Douligeris, “Secure Multipath Routing for Mobile Ad Hoc Networks,” in Second Annual Conference on Wireless On-demand Network Systems and Services, 2005, pp. 89–96.
[35] M. Burmester and T. Van Les, “Secure Multipath Communication in Mobile Ad Hoc Networks,” in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 04), 2004, pp. 405–409.
[36] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, “SecMR - a secure multipath routing protocol for ad hoc networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 87–99, Jan. 2007.
[37] M. Kefayati, H. R. Rabiee, and A. Khonsari, “Misbehavior Resilient Multi-path Data Transmission in Mobile Ad-hoc Networks Categories and Subject Descriptors,” Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pp. 91–100, 2006.
[38] W. Lou, W. Liu, and Y. Fang, “SPREAD: Enhancing data confidentiality in mobile ad hoc networks,” in Proceedings - IEEE INFOCOM, 2004, vol. 4, pp. 2404–2413.
[39] L. Chen and J. Leneutre, “On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 6, pp. 1–13, 2009.