Skip to main content

Topology-Hiding Multipath Routing Protocol: A Modified Approach for Wireless Network

  • Conference paper
  • First Online:
Techno-Societal 2016 (ICATSA 2016)

Abstract

A mobile ad hoc network (MANET) is dynamic, ad hoc, infrastructure less and self-configurable having autonomous nodes. Route discovery in MANET is dynamic. Security from malicious attacks in MANET is a huge challenge. Topology hiding is a technique to improve MANET security. Topology Hiding hides topology information sent from a network to an untrusted Network. It also restores the topology. One such protocol Topology-Hiding Multipath Routing protocol (THMR) overcomes the threat of topology-exposure. Our proposed Modified THMR (M-THMR) improves upon THMR and works on fault nodes detection and avoidance. The protocol is implemented for performance comparison with THMR protocol. Experimental results show that M-THMR protocol is well performs better in delay, packet delivery and packet loss with low overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lacuesta R, Lloret J, Garcia M, Penalver L (2013) A secure protocol for spontaneous wireless ad hoc networks creation. IEEE Trans Paral Distrib Syst 24(4)

    Google Scholar 

  2. Sahadevaiah K, Prasad Reddy PVGD (2011) Impact of security attacks on a new security protocol for mobile ad hoc networks. Netw Protoc Alg 3(4):122–140

    Google Scholar 

  3. Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 6(5):488–502

    Article  Google Scholar 

  4. Perkins CE, Royer EM, Das SR (2003) Ad hoc on-demand distance vector (AODV) routing. IETF INTERNET DRAFT, MANET working group. Feb 2003

    Google Scholar 

  5. Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1):38–47

    Article  Google Scholar 

  6. Kong J, Zerfos P, Luo H, Lu S, Zhang L (2001) Providing robust and ubiquitous security support for wireless mobile networks. In: ICNP, pp 251–260

    Google Scholar 

  7. Huang TC, Huang SY et al (2010) AODV-based backup routing scheme in mobile ad hoc networks. In: International conference on communications and mobile computing (CMC), pp 254–258

    Google Scholar 

  8. Yang YB, Chen HB (2009) An improved AODV routing protocol for MANETs. In: International conference on wireless communications, networking and mobile computing (WiCom), pp 1–4

    Google Scholar 

  9. Li X, Cuthbert L (2004) Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. In: IEEE annual international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOT), pp 184–191

    Google Scholar 

  10. Ye Z, Krishnamurthy SV et al (2004) A routing framework for providing robustness to node failures in mobile ad hoc networks. Ad Hoc Netw 2(1):87–107

    Article  Google Scholar 

  11. Lee SJ, Gerla M (2000) AODV-BR: backup routing in ad hoc networks. In: IEEE wireless communications and networking conference (WCNC), pp 1311–1316

    Google Scholar 

  12. Marina MK, Das SR (2001) On-demand multipath distance vector routing in ad hoc, p 23. doi:10.1109/ICNP.2001.992756

  13. Sanzgiri K, Dahill B, Levine BN, Shields C, Royer EM (2002) A secure routing protocol for ad hoc networks (pdf). Technical report: UM-CS-2002-032

    Google Scholar 

  14. Papadimitratos P, Haas Z (2002) Secure routing for mobile ad hoc networks. In: SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX

    Google Scholar 

  15. Burmester M, Medeiros B (2009) On the security of route discovery in MANETs. IEEE Trans Mob Comput 8(9):1180–1188

    Article  Google Scholar 

  16. Wang B, Huang C, Yang W, Wang T (2010) Trust opportunistic routing protocol in multi-hop wireless networks. In: 2010 IEEE international conference on wireless communications, networking and information security (WCNIS), Beijing, China, pp 563–567. doi:10.1109/WCINS.2010.5541842

  17. Chai K, Le A-N, Cho Y-Z (2009) Load balanced routing protocols for ad hoc mobile wireless networks. Art IEEE Commun Mag (Sept 2009)

    Google Scholar 

  18. Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 10(4):78–93 (Fourth quarter 2008)

    Google Scholar 

  19. Pirzada A, McDonald C (2005) Secure routing with the AODV protocol. In: Proceedings of the Asia-Pacific conference on communications, pp 57–61

    Google Scholar 

  20. Johnson DB, Maltz DA, Hu YC (2004) The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF INTERNET DRAFT, MANET working group, July 2004

    Google Scholar 

  21. Yu W, Sun Y, Liu KJR (2005) HADOF: defense against routing disruption in mobile ad hoc networks. In: Proceedings of conference on IEEE INFOCOM

    Google Scholar 

  22. Yu W, Sun Y, Liu KJR (2005) Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks. Proceedings of second annual IEEE CS conference on sensor and ad hoc communication and networks (SECON ’05)

    Google Scholar 

  23. Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun 11(1):38–47

    Article  Google Scholar 

  24. Luo H, Zerfos P, Kong J, Lu S, Zhang L (2002) Self-securing ad hoc wireless networks. In: Proceedings of seventh IEEE symposium on computers and communication (ISCC ’02)

    Google Scholar 

  25. Abedi O, Fathy M (2008) Enhancing AODV routing protocol using mobility parameters in VANET, IEEE/ACS international conference on computer systems and applications, AICCSA 2008

    Google Scholar 

  26. Asokan N, Ginzboorg P (2000) Key agreement in ad-hoc networks. Comput Commun Rev 23:1627–1637

    Article  Google Scholar 

  27. Kong J, Zerfos P, Luo H, Lu S, Zhang L (2001) Providing robust and ubiquitous security support for wireless mobile networks. In: ICNP, pp 251–260

    Google Scholar 

  28. Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11/12):2314–2341

    Article  Google Scholar 

  29. Zhu S, Xu S, Setia S, Jajodia S (2006) LHAP: a lightweight hop by-hop authentication protocol for ad-hoc networks. Ad Hoc Netw J 4(5):567–585

    Article  Google Scholar 

  30. Yan J, Ma J, Li F, Moon SJ (2010) Key pre-distribution scheme with node revocation for wireless sensor networks. Ad Hoc Sens Wirel Netw 10(2/3):235–251

    Google Scholar 

  31. Mukesh M, Rishi KR (2010) Security aspects in mobile ad hoc network (MANETs): technical review. Int J Comput Appl 12(2):37–43

    Google Scholar 

  32. Zhang Y, Wang G, Hu Q, Li Z, Tian J (2012) Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks. In: INFOCOM, 2012 proceedings IEEE, Orlando, FL, pp 10–18. doi:10.1109/INFCOM.2012.6195468

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akshay Suhas Phalke .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Phalke, A.S., Chaudhari, M.S. (2018). Topology-Hiding Multipath Routing Protocol: A Modified Approach for Wireless Network. In: Pawar, P., Ronge, B., Balasubramaniam, R., Seshabhattar, S. (eds) Techno-Societal 2016. ICATSA 2016. Springer, Cham. https://doi.org/10.1007/978-3-319-53556-2_106

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53556-2_106

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53555-5

  • Online ISBN: 978-3-319-53556-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics