Secure Multipath Routing for Efficient Load Balancing and Jamming Attack Protection

  • Diksha SinghalEmail author
  • Ritu Prasad
  • Praneet SaurabhEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)


Mobile ad hoc network (MANET) brings simplicity and flexibility but also introduces constraints due to mobility, dynamic configuration, limited resources, and security. Security is among the most important limitations in MANET. Because of its distinctive features, MANET creates a variety of serious challenges. The various protection schemes aligned with routing makes efforts in lowering threat perception. In this paper, a novel security mechanism named secure multipath routing (SMR) for MANET is proposed for jamming attacks that also takes care of routing and load balancing. The proposed technique will first identify the attacked node, and then, it will not allow other attacker node/s. Thereafter, as a corrective measure it blocks the activity of offender and drops it from the routing. SMR is then judged against conventional AODV and AOMDV protocols in NS-2.35. Experimental results show that the proposed SMR demonstrates better results in terms of throughput, average end-to-end delay, packet delivery ratio, and routing overhead.


AODV AOMDV Routing Multipath routing MANET 


  1. 1.
    Cao, Q., Abdelzaher, T., Stankovic, J., Whitehouse, K., Luo, L.: Declarative tracepoints: a programmable and application independent debugging system for wireless sensor networks. In: Proceedings of the ACM SenSys, Raleigh, NC, USA, pp. 85–98 (2008)Google Scholar
  2. 2.
    Shu, T., Krunz, M., Liu, S.: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput. 9(7), 941–954 (2010)CrossRefGoogle Scholar
  3. 3.
    Salem, A.M., Yadav, R.: Efficient load balancing routing technique for mobile Ad Hoc networks. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 7(5), 249–254 (2016)Google Scholar
  4. 4.
    Thakur, N., Sankaralingam, A.: Introduction to Jamming attacks and prevention techniques using Honey pots in wireless networks. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 3(2), 202–207 (2013)Google Scholar
  5. 5.
    Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile Ad Hoc networks. In: Wireless On-demand Network Systems and Services, WOWMOM, pp. 581–587 (2005)Google Scholar
  6. 6.
    Nasser, N., Chen, Y.: Secure multipath routing protocol for wireless sensor networks. In: 27th International Conference on Distributed Computing Systems Workshops (ICDCSW’07) (2007)Google Scholar
  7. 7.
    Stavrou, E., Pitsillides, A.: A survey on secure multipath routing protocols in WSNs. Comput. Netw. Int. J. Comput. Telecommun. Netw. 54(13), 2215–2238 (2010)zbMATHGoogle Scholar
  8. 8.
    Vasudevan, A.R., Sanyal, S.: A novel multipath approach to security in mobile Ad Hoc networks (MANETs). In: Proceedings of International Conference on Computers and Devices for Communication (CODEC’04), pp. 1–4 (2004)Google Scholar
  9. 9.
    Li, X., Ma, Q., Cao, Z., Liu, K., Liu, Y.: Enhancing visibility of network performance in large-scale sensor networks. In: Proceedings of the IEEE ICDCS, Madrid, Spain, pp. 409–418 (2014)Google Scholar
  10. 10.
    Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight-based secure approach for identifying selfishness behavior of node in MANET, information and decision sciences. Adv. Intell. Syst. Comput. 701, 387–397 (2018) (Springer, Heidelberg)Google Scholar
  11. 11.
    Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016). (Elsevier)CrossRefGoogle Scholar
  12. 12.
    Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)Google Scholar
  13. 13.
    Saurabh, P., Verma, B., Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012), vol. 202 of the series Advances in Intelligent Systems and Computing, pp 417–428. Springer, Heidelberg (2012)Google Scholar
  14. 14.
    Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. Recent Trends Comput. Netw. Distrib. Syst. Secur. 335, 474–484 (2011). (CCIS, Springer)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Technocrats Institute of Technology AdvanceBhopalIndia
  2. 2.Technocrats Institute of TechnologyBhopalIndia

Personalised recommendations