Abstract
Security in infrastructure-less networks like MANETs (Mobile Ad Hoc Networks) has proven to be a challenging task. Multipath routing protocols were initially proposed in order to design robust and secure networks. These protocols improve network performance in terms of delay, throughput, reliability and life time. It is hard to find a single protocol that can improve all these performance parameters. In this paper we propose a secure prioritized trust based multi path routing protocol. It ensures reliable communication with low overhead and minimum delay. This is realized by discovering and selecting reliable path based on the trust information. We take the advantage of multiple paths to increase reliability and robustness of data through context aware routing. Results show the effectiveness of our protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., Weiss, W.: An Architecture for differentiated services. Internet draft IETF RFC 2475 (1998)
Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.G.: A performance comparison of multihop wireless ad hoc network routing protocols. In: Proceeding of International Conference Mobile Computing and Networking (MobiCom), pp. 85–97. ACM Press, New York (1998)
Buchegger, S., Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes—Fairness In Distributed Ad hoc NeTworks. In: Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing, Switzerland, pp. 226–236 (2006)
Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly and Associates, Sebastopol (1995)
IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, NY (1997)
Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561 (2003), http://www.ietf.org/rfc/rfc3561.txt
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom), pp. 255–265. ACM Press, New York (2000)
Pirzada, A.A., Datta, A., McDonald, C.: Propagating trust in ad-hoc networks for reliable routing. In: Proceeding of IEEE International Workshop Wireless Ad Hoc Networks, Finland, pp. 58–62 (2004)
Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceeding of IEEE International Conference Networks, Singapore, pp. 326–330 (2004)
Poonam, Garg, K., Misra, M.: Trust based multi path DSR protocol. In: Proceedings of Fifth International Conference on Availability, Reliability and Security, Poland (February 2010)
QUALNET simulator, http://www.scalable-networks.com
Yong, C., Chuanhe, H., Wenming, S.: Trusted Dynamic Source Routing Protocol. In: IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Athens, Greece, pp. 1632–1636 (2007)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 1–12 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Poonam, Garg, K., Misra, M. (2010). A Secure Prioritized Trust Based Multi-path Routing Protocol for Ad Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-14493-6_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14492-9
Online ISBN: 978-3-642-14493-6
eBook Packages: Computer ScienceComputer Science (R0)