Skip to main content

Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols

  • Conference paper
Computer Network Security (MMM-ACNS 2007)

Abstract

Current multipath protocols for Multi-Hop Wireless Networks (MWNs) use hop-count as the default route selection criteria. Route selection should also consider network and link conditions. We propose a network-environment-aware trust-based route selection framework for MWNs that makes informed and adaptive route-selection decisions. A node quantifies trust values for its neighboring nodes and for the routes that pass through it. The trust metric adjusts to varying network conditions and quick convergence of the protocol implies it works well in mobility scenarios. Glomosim simulations demonstrate throughput improvement over conventional multipath protocols under congestion, link failure and route unreliability scenarios.

Research supported in part by U.S. Air Force Research Laboratory Grant No. 20082IJ.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marina, M.K., Das, S.R.: Ad-hoc On-demand Multipath Distance Vector Routing. In: Proceedings of the IEEE International Conference on Network Protocols (ICNP), pp. 14–23. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  2. Perkins, C., Royer, E., Das, S.: Ad hoc On-Demand, Distance Vector Routing. RFC-3651 (2003)

    Google Scholar 

  3. Ye, Z., Krishnamurthy, S., Tripathi, S.: A Framework for Reliable, Routing in Mobile Ad Hoc Networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  4. Zeng, X., Bagrodia, R., Gerla, M., GloMosim: A library for Parallel Simulation of Large-Scale Wireless Networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulations (1998)

    Google Scholar 

  5. Li, H., Singhal, M.: Trust Management in Distributed Systems. Computer 40, 45–53 (2007)

    Article  Google Scholar 

  6. Sun, Y., Han, Z., Yu, W., Liu, K.J.: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks. In: Proceedings of the IEEE Conference on Computer Communications INFOCOM, IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  7. Li, X., Lyu, M.R., Liu, J.: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks. In: Proceedings of the IEEE Aerospace Conference (IEEEAC) pp. 1286–1295. IEEE Computer Society Press, Los Alamitos (2004).

    Google Scholar 

  8. Zouridaki, C., Mark, B. Hejmo, M., Thomas, R: A Quantitative Trust Establishment Framework or Reliable Data Packet Delivery in MANETs. In: Proceedings of Workshop on Security of Ad-Hoc and Sensor Networks (SASN), Alexandria, VA (2005)

    Google Scholar 

  9. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Network. In: Proceedings of 6th Annual Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  10. Li, J., Blake, C., De-Couto, D., Lee, H., Morris, R.: Capacity of Ad Hoc Wireless Networks. In: Proceedings of International Conference on Mobile Computing and Networking (MOBICOM) (2001)

    Google Scholar 

  11. Yuan, Y., Chen, H., Jia, M.: An Optimized Ad-hoc On-demand Multipath Distance Vector (AOMDV) Routing Protocol. In: Proceeding, of the Asia-Pacific Conference on Communications, Australia (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Virendra, M., Krishnamurthy, A., Narayaman, K., Upadhyaya, S., Kwiat, K. (2007). Environment-A ware Trusted Data Delivery in Multipath Wireless Protocols. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73986-9_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73985-2

  • Online ISBN: 978-3-540-73986-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics