Abstract
This paper presents a Reliability-based Source Routing (RSR) protocol for mobile ad hoc networks (MANETs). RSR works as follows: Before sending a Route Reply (RREP) packet on a preferred path, the destination validates the discovered path by sending an encrypted Probe packet to the source. If the source node receives the Probe packet, it sends back an Acknowledgment back to the destination. If the Acknowledgment packet is received, the destination sends the RREP packet. Otherwise, the destination chooses the path that has the largest Reliability Metric. The Reliability Metric of a path is the minimum of the Reliability Metric of the constituent nodes of the path. The Reliability Metric of a node (a measure of trust) is updated based on the periodic encrypted beacon exchange, propagation of the Route Request (RREQ), RREP and data packets. The above procedure is repeated until a route can or cannot be discovered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Perkins, C.E., Bhagawat, P.: Highly Dynamic Destination Sequenced Distance Vector Routing for Mobile Computers. In: 17th International Conference of Special Interest Group on Data Communications, pp. 234–244. ACM, London (1994)
Murthy, S., Garcia-Luna-Aceves, J.J.: Loop-Free Internet Routing using Hierarchical Routing Trees. In: 16th International Conference on Computer Communications, pp. 101–108. IEEE, Kobe (1997)
Johnson, D.B., Maltz, D.A., Broch, J.: DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad hoc Networks. In: Perkins, C.E. (ed.) Ad hoc Networking, pp. 139–172. Addison-Wesley, New York (2001)
Perkins, C.E., Royer, E.M.: The Ad hoc On-demand Distance Vector Protocol. In: Perkins, C.E. (ed.) Ad hoc Networking, pp. 173–219. Addison-Wesley, New York (2000)
Haas, Z.J., Pearlman, M.R., Samar, P.: The Zone Routing Protocol (ZRP) for Ad hoc Networks, IETF Draft (2003)
Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A Performance Comparison of Multi-hop Wireless Ad hoc Network Routing Protocols. In: 4th International Conference on Mobile Computing and Networking, pp. 85–97. ACM, Dallas (1998)
Johansson, P., Larson, T., Hedman, N., Mielczarek, B., DegerMark, M.: Scenario-based Performance Analysis of Routing Protocols for Mobile Ad hoc Networks. In: 5th International Conference on Mobile Computing and Networking, pp. 195–206. ACM, Seattle (1999)
Mishra, A., Nadkarni, J.M.: Security in Wireless Ad hoc Networks. In: The Handbook of Ad hoc Wireless Networks, pp. 499–599. CRC Press, USA (2003)
Meghanathan, N.: A Location Prediction Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad hoc Networks. The Computer Journal 52(4), 461–482 (2002)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference, SCS, San Antonio, USA, pp. 27–31 (2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University, USA (2001)
Ghazizadeh, S., Ilghami, O., Sirin, E.: Security-aware Adaptive Dynamic Source Routing Protocol. In: 27th International Conference on Local Computer Networks, pp. 751–760. IEEE, Tampa (2002)
Papadimitratos, P., Haas, Z.J.: Secure Data Transmission in Mobile Ad hoc Networks. In: Workshop in Wireless Security. ACM, San Diego (2003)
Yau, P., Mitchell, C.: Security Vulnerabilities in Ad hoc Networks. In: 7th International Symposium on Communication Theory and Applications, Ambleside, UK (2003)
Pei, G., Gerla, M., Chen, T.-W.: Fisheye State Routing in Mobile Ad hoc Networks. In: ICDCS Workshop on Wireless Networks and Mobile Computing, Taipei, Taiwan (2000)
Meghanathan, N.: Exploring the Stability-Energy Consumption-Delay-Network Lifetime Tradeoff of Mobile Ad hoc Network Routing Protocols. Journal of Networks 3(2), 17–28 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Meghanathan, N. (2010). Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)