Skip to main content

Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks

  • Conference paper
Book cover Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

  • 3455 Accesses

Abstract

This paper presents a Reliability-based Source Routing (RSR) protocol for mobile ad hoc networks (MANETs). RSR works as follows: Before sending a Route Reply (RREP) packet on a preferred path, the destination validates the discovered path by sending an encrypted Probe packet to the source. If the source node receives the Probe packet, it sends back an Acknowledgment back to the destination. If the Acknowledgment packet is received, the destination sends the RREP packet. Otherwise, the destination chooses the path that has the largest Reliability Metric. The Reliability Metric of a path is the minimum of the Reliability Metric of the constituent nodes of the path. The Reliability Metric of a node (a measure of trust) is updated based on the periodic encrypted beacon exchange, propagation of the Route Request (RREQ), RREP and data packets. The above procedure is repeated until a route can or cannot be discovered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perkins, C.E., Bhagawat, P.: Highly Dynamic Destination Sequenced Distance Vector Routing for Mobile Computers. In: 17th International Conference of Special Interest Group on Data Communications, pp. 234–244. ACM, London (1994)

    Google Scholar 

  2. Murthy, S., Garcia-Luna-Aceves, J.J.: Loop-Free Internet Routing using Hierarchical Routing Trees. In: 16th International Conference on Computer Communications, pp. 101–108. IEEE, Kobe (1997)

    Google Scholar 

  3. Johnson, D.B., Maltz, D.A., Broch, J.: DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad hoc Networks. In: Perkins, C.E. (ed.) Ad hoc Networking, pp. 139–172. Addison-Wesley, New York (2001)

    Google Scholar 

  4. Perkins, C.E., Royer, E.M.: The Ad hoc On-demand Distance Vector Protocol. In: Perkins, C.E. (ed.) Ad hoc Networking, pp. 173–219. Addison-Wesley, New York (2000)

    Google Scholar 

  5. Haas, Z.J., Pearlman, M.R., Samar, P.: The Zone Routing Protocol (ZRP) for Ad hoc Networks, IETF Draft (2003)

    Google Scholar 

  6. Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A Performance Comparison of Multi-hop Wireless Ad hoc Network Routing Protocols. In: 4th International Conference on Mobile Computing and Networking, pp. 85–97. ACM, Dallas (1998)

    Google Scholar 

  7. Johansson, P., Larson, T., Hedman, N., Mielczarek, B., DegerMark, M.: Scenario-based Performance Analysis of Routing Protocols for Mobile Ad hoc Networks. In: 5th International Conference on Mobile Computing and Networking, pp. 195–206. ACM, Seattle (1999)

    Google Scholar 

  8. Mishra, A., Nadkarni, J.M.: Security in Wireless Ad hoc Networks. In: The Handbook of Ad hoc Wireless Networks, pp. 499–599. CRC Press, USA (2003)

    Google Scholar 

  9. Meghanathan, N.: A Location Prediction Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad hoc Networks. The Computer Journal 52(4), 461–482 (2002)

    Article  Google Scholar 

  10. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference, SCS, San Antonio, USA, pp. 27–31 (2002)

    Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University, USA (2001)

    Google Scholar 

  12. Ghazizadeh, S., Ilghami, O., Sirin, E.: Security-aware Adaptive Dynamic Source Routing Protocol. In: 27th International Conference on Local Computer Networks, pp. 751–760. IEEE, Tampa (2002)

    Google Scholar 

  13. Papadimitratos, P., Haas, Z.J.: Secure Data Transmission in Mobile Ad hoc Networks. In: Workshop in Wireless Security. ACM, San Diego (2003)

    Google Scholar 

  14. Yau, P., Mitchell, C.: Security Vulnerabilities in Ad hoc Networks. In: 7th International Symposium on Communication Theory and Applications, Ambleside, UK (2003)

    Google Scholar 

  15. Pei, G., Gerla, M., Chen, T.-W.: Fisheye State Routing in Mobile Ad hoc Networks. In: ICDCS Workshop on Wireless Networks and Mobile Computing, Taipei, Taiwan (2000)

    Google Scholar 

  16. Meghanathan, N.: Exploring the Stability-Energy Consumption-Delay-Network Lifetime Tradeoff of Mobile Ad hoc Network Routing Protocols. Journal of Networks 3(2), 17–28 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Meghanathan, N. (2010). Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics