Advertisement

Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols

  • Mohit Virendra
  • Arunn Krishnamurthy
  • Krishnan Narayaman
  • Shambhu Upadhyaya
  • Kevin Kwiat
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1)

Abstract

Current multipath protocols for Multi-Hop Wireless Networks (MWNs) use hop-count as the default route selection criteria. Route selection should also consider network and link conditions. We propose a network-environment-aware trust-based route selection framework for MWNs that makes informed and adaptive route-selection decisions. A node quantifies trust values for its neighboring nodes and for the routes that pass through it. The trust metric adjusts to varying network conditions and quick convergence of the protocol implies it works well in mobility scenarios. Glomosim simulations demonstrate throughput improvement over conventional multipath protocols under congestion, link failure and route unreliability scenarios.

Keywords

AOMDV Multipath Routing Security Trust 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Marina, M.K., Das, S.R.: Ad-hoc On-demand Multipath Distance Vector Routing. In: Proceedings of the IEEE International Conference on Network Protocols (ICNP), pp. 14–23. IEEE Computer Society Press, Los Alamitos (2001)Google Scholar
  2. 2.
    Perkins, C., Royer, E., Das, S.: Ad hoc On-Demand, Distance Vector Routing. RFC-3651 (2003)Google Scholar
  3. 3.
    Ye, Z., Krishnamurthy, S., Tripathi, S.: A Framework for Reliable, Routing in Mobile Ad Hoc Networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  4. 4.
    Zeng, X., Bagrodia, R., Gerla, M., GloMosim: A library for Parallel Simulation of Large-Scale Wireless Networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulations (1998)Google Scholar
  5. 5.
    Li, H., Singhal, M.: Trust Management in Distributed Systems. Computer 40, 45–53 (2007)CrossRefGoogle Scholar
  6. 6.
    Sun, Y., Han, Z., Yu, W., Liu, K.J.: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks. In: Proceedings of the IEEE Conference on Computer Communications INFOCOM, IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  7. 7.
    Li, X., Lyu, M.R., Liu, J.: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks. In: Proceedings of the IEEE Aerospace Conference (IEEEAC) pp. 1286–1295. IEEE Computer Society Press, Los Alamitos (2004).Google Scholar
  8. 8.
    Zouridaki, C., Mark, B. Hejmo, M., Thomas, R: A Quantitative Trust Establishment Framework or Reliable Data Packet Delivery in MANETs. In: Proceedings of Workshop on Security of Ad-Hoc and Sensor Networks (SASN), Alexandria, VA (2005)Google Scholar
  9. 9.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Network. In: Proceedings of 6th Annual Conference on Mobile Computing and Networking, pp. 255–265 (2000)Google Scholar
  10. 10.
    Li, J., Blake, C., De-Couto, D., Lee, H., Morris, R.: Capacity of Ad Hoc Wireless Networks. In: Proceedings of International Conference on Mobile Computing and Networking (MOBICOM) (2001)Google Scholar
  11. 11.
    Yuan, Y., Chen, H., Jia, M.: An Optimized Ad-hoc On-demand Multipath Distance Vector (AOMDV) Routing Protocol. In: Proceeding, of the Asia-Pacific Conference on Communications, Australia (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Mohit Virendra
    • 2
  • Arunn Krishnamurthy
    • 2
  • Krishnan Narayaman
    • 2
  • Shambhu Upadhyaya
    • 1
  • Kevin Kwiat
    • 2
  1. 1.US Air Force Research LaboratoryRome
  2. 2.Computer Science & Eng.State University of New York at BuffaloBuffaloUSA

Personalised recommendations