Skip to main content

A Secure Prioritized Trust Based Multi-path Routing Protocol for Ad Hoc Networks

  • Conference paper
  • 1023 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 90))

Abstract

Security in infrastructure-less networks like MANETs (Mobile Ad Hoc Networks) has proven to be a challenging task. Multipath routing protocols were initially proposed in order to design robust and secure networks. These protocols improve network performance in terms of delay, throughput, reliability and life time. It is hard to find a single protocol that can improve all these performance parameters. In this paper we propose a secure prioritized trust based multi path routing protocol. It ensures reliable communication with low overhead and minimum delay. This is realized by discovering and selecting reliable path based on the trust information. We take the advantage of multiple paths to increase reliability and robustness of data through context aware routing. Results show the effectiveness of our protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., Weiss, W.: An Architecture for differentiated services. Internet draft IETF RFC 2475 (1998)

    Google Scholar 

  2. Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.C., Jetcheva, J.G.: A performance comparison of multihop wireless ad hoc network routing protocols. In: Proceeding of International Conference Mobile Computing and Networking (MobiCom), pp. 85–97. ACM Press, New York (1998)

    Google Scholar 

  3. Buchegger, S., Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes—Fairness In Distributed Ad hoc NeTworks. In: Proceeding ACM Workshop Mobile Ad Hoc Networking and Computing, Switzerland, pp. 226–236 (2006)

    Google Scholar 

  4. Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly and Associates, Sebastopol (1995)

    Google Scholar 

  5. IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, NY (1997)

    Google Scholar 

  6. Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561 (2003), http://www.ietf.org/rfc/rfc3561.txt

  7. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceeding of Sixth Annual International Conference Mobile Computing and Networking (MobiCom), pp. 255–265. ACM Press, New York (2000)

    Chapter  Google Scholar 

  8. Pirzada, A.A., Datta, A., McDonald, C.: Propagating trust in ad-hoc networks for reliable routing. In: Proceeding of IEEE International Workshop Wireless Ad Hoc Networks, Finland, pp. 58–62 (2004)

    Google Scholar 

  9. Pirzada, A.A., Datta, A., McDonald, C.: Trust-based routing for ad-hoc wireless networks. In: Proceeding of IEEE International Conference Networks, Singapore, pp. 326–330 (2004)

    Google Scholar 

  10. Poonam, Garg, K., Misra, M.: Trust based multi path DSR protocol. In: Proceedings of Fifth International Conference on Availability, Reliability and Security, Poland (February 2010)

    Google Scholar 

  11. QUALNET simulator, http://www.scalable-networks.com

  12. Yong, C., Chuanhe, H., Wenming, S.: Trusted Dynamic Source Routing Protocol. In: IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Athens, Greece, pp. 1632–1636 (2007)

    Google Scholar 

  13. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 1–12 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poonam, Garg, K., Misra, M. (2010). A Secure Prioritized Trust Based Multi-path Routing Protocol for Ad Hoc Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14493-6_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14492-9

  • Online ISBN: 978-3-642-14493-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics