Abstract
A mobile ad hoc network (MANET) is dynamic, ad hoc, infrastructure less and self-configurable having autonomous nodes. Route discovery in MANET is dynamic. Security from malicious attacks in MANET is a huge challenge. Topology hiding is a technique to improve MANET security. Topology Hiding hides topology information sent from a network to an untrusted Network. It also restores the topology. One such protocol Topology-Hiding Multipath Routing protocol (THMR) overcomes the threat of topology-exposure. Our proposed Modified THMR (M-THMR) improves upon THMR and works on fault nodes detection and avoidance. The protocol is implemented for performance comparison with THMR protocol. Experimental results show that M-THMR protocol is well performs better in delay, packet delivery and packet loss with low overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lacuesta R, Lloret J, Garcia M, Penalver L (2013) A secure protocol for spontaneous wireless ad hoc networks creation. IEEE Trans Paral Distrib Syst 24(4)
Sahadevaiah K, Prasad Reddy PVGD (2011) Impact of security attacks on a new security protocol for mobile ad hoc networks. Netw Protoc Alg 3(4):122–140
Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 6(5):488–502
Perkins CE, Royer EM, Das SR (2003) Ad hoc on-demand distance vector (AODV) routing. IETF INTERNET DRAFT, MANET working group. Feb 2003
Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1):38–47
Kong J, Zerfos P, Luo H, Lu S, Zhang L (2001) Providing robust and ubiquitous security support for wireless mobile networks. In: ICNP, pp 251–260
Huang TC, Huang SY et al (2010) AODV-based backup routing scheme in mobile ad hoc networks. In: International conference on communications and mobile computing (CMC), pp 254–258
Yang YB, Chen HB (2009) An improved AODV routing protocol for MANETs. In: International conference on wireless communications, networking and mobile computing (WiCom), pp 1–4
Li X, Cuthbert L (2004) Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. In: IEEE annual international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOT), pp 184–191
Ye Z, Krishnamurthy SV et al (2004) A routing framework for providing robustness to node failures in mobile ad hoc networks. Ad Hoc Netw 2(1):87–107
Lee SJ, Gerla M (2000) AODV-BR: backup routing in ad hoc networks. In: IEEE wireless communications and networking conference (WCNC), pp 1311–1316
Marina MK, Das SR (2001) On-demand multipath distance vector routing in ad hoc, p 23. doi:10.1109/ICNP.2001.992756
Sanzgiri K, Dahill B, Levine BN, Shields C, Royer EM (2002) A secure routing protocol for ad hoc networks (pdf). Technical report: UM-CS-2002-032
Papadimitratos P, Haas Z (2002) Secure routing for mobile ad hoc networks. In: SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX
Burmester M, Medeiros B (2009) On the security of route discovery in MANETs. IEEE Trans Mob Comput 8(9):1180–1188
Wang B, Huang C, Yang W, Wang T (2010) Trust opportunistic routing protocol in multi-hop wireless networks. In: 2010 IEEE international conference on wireless communications, networking and information security (WCNIS), Beijing, China, pp 563–567. doi:10.1109/WCINS.2010.5541842
Chai K, Le A-N, Cho Y-Z (2009) Load balanced routing protocols for ad hoc mobile wireless networks. Art IEEE Commun Mag (Sept 2009)
Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 10(4):78–93 (Fourth quarter 2008)
Pirzada A, McDonald C (2005) Secure routing with the AODV protocol. In: Proceedings of the Asia-Pacific conference on communications, pp 57–61
Johnson DB, Maltz DA, Hu YC (2004) The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF INTERNET DRAFT, MANET working group, July 2004
Yu W, Sun Y, Liu KJR (2005) HADOF: defense against routing disruption in mobile ad hoc networks. In: Proceedings of conference on IEEE INFOCOM
Yu W, Sun Y, Liu KJR (2005) Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks. Proceedings of second annual IEEE CS conference on sensor and ad hoc communication and networks (SECON ’05)
Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun 11(1):38–47
Luo H, Zerfos P, Kong J, Lu S, Zhang L (2002) Self-securing ad hoc wireless networks. In: Proceedings of seventh IEEE symposium on computers and communication (ISCC ’02)
Abedi O, Fathy M (2008) Enhancing AODV routing protocol using mobility parameters in VANET, IEEE/ACS international conference on computer systems and applications, AICCSA 2008
Asokan N, Ginzboorg P (2000) Key agreement in ad-hoc networks. Comput Commun Rev 23:1627–1637
Kong J, Zerfos P, Luo H, Lu S, Zhang L (2001) Providing robust and ubiquitous security support for wireless mobile networks. In: ICNP, pp 251–260
Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M (2007) A survey of key management schemes in wireless sensor networks. Comput Commun 30(11/12):2314–2341
Zhu S, Xu S, Setia S, Jajodia S (2006) LHAP: a lightweight hop by-hop authentication protocol for ad-hoc networks. Ad Hoc Netw J 4(5):567–585
Yan J, Ma J, Li F, Moon SJ (2010) Key pre-distribution scheme with node revocation for wireless sensor networks. Ad Hoc Sens Wirel Netw 10(2/3):235–251
Mukesh M, Rishi KR (2010) Security aspects in mobile ad hoc network (MANETs): technical review. Int J Comput Appl 12(2):37–43
Zhang Y, Wang G, Hu Q, Li Z, Tian J (2012) Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks. In: INFOCOM, 2012 proceedings IEEE, Orlando, FL, pp 10–18. doi:10.1109/INFCOM.2012.6195468
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Phalke, A.S., Chaudhari, M.S. (2018). Topology-Hiding Multipath Routing Protocol: A Modified Approach for Wireless Network. In: Pawar, P., Ronge, B., Balasubramaniam, R., Seshabhattar, S. (eds) Techno-Societal 2016. ICATSA 2016. Springer, Cham. https://doi.org/10.1007/978-3-319-53556-2_106
Download citation
DOI: https://doi.org/10.1007/978-3-319-53556-2_106
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53555-5
Online ISBN: 978-3-319-53556-2
eBook Packages: EngineeringEngineering (R0)