Abstract
A Mobile Ad hoc Network (MANET) is a formation of the dynamic network with a group of mobile nodes and communicating through wireless links. The key issue of the mobile MANET is lack of infrastructure and resource constraint that causes fault node. Hence, MANET is exposed to dangerous attacks. In order to improve the secure routing in the network and reduce hazards by fault nodes, we enhance the existing protocol Ad hoc On-Demand Multipath Distance Vector (AOMDV) and designed routing protocol named Trusted Security Adhoc On-Demand Multipath Distance Vector (TS-AOMDV). The TS-AOMDV protocol finding and removing fault node attacks like flooding, blackhole, and grayhole attacks in the network. The detection and segregation of attacks done by using IDS and secure routing in route finding and data transmission phases. An IDS monitor data and control packets those participated in data transmission and route finding phases. In order to enhance the performance of routing in the MANET, An IDS combines and calculate data in the AOMDV for detecting attacks. This improves the TS-AOMDV to give a better performance of routing and protection in MANET. At last, the proposed protocol TS-AOMDV is evaluated with obtainable protocol AOMDV, the performance is analyzed by using the NS-2 simulator and improves routing performance like throughput by 59.1%. The result observed from a simulation that the proposed method enhances the performance of routing like as end-to-end delay, throughput, control overhead, and packet delivery ratio.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Erciyes, K. “Distributed Graph Algorithms for Computer Networks”, Computer Communications and Networks, London: Springer, pp. 259–275, (2013)
S. Abdel Hamid, H. Hassanein and G. Takahara, “Routing for Wireless Multi-Hop Networks: Unifying Features”, SpringerBriefs in Computer Science, pp. 11–23, (2013)
Hamid, S. A., Hassanein, H., & Takahara, G., “Routing for Wireless Multi Hop Networks–Unifying and Distinguishing Features”, School of Comp.—Queen’s University, Canada, report 583, (2011)
Habib, S., Saleem, S., & Saqib, K. M., “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCOReD, pp. 529–533, (2013)
A. Ahmed, K. Abu Bakar, M. Channa, K. Haseeb and A. Khan, “A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks”, Frontiers of Computer Science, vol. 9, no. 2, pp. 280–296, (2015)
I. Abdel-Halim, H. Fahmy and A. Bahaa-Eldin, “Agent-based trusted on-demand routing protocol for mobile ad-hoc networks”, Wireless Netw, vol. 21, no. 2, pp. 467–483, (2015)
Mahmoud, Mohamed MEA, and Xuemin Sherman Shen. “Secure routing protocols.” Security for Multi-hop Wireless Networks. Springer International Publishing, pp. 63–93, (2014)
Shanmuganathan, V., and T. Anand. “A Survey on Gray Hole Attack in MANET.” IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), pp. 2250–3501, (2012)
Tayal, S., & Gupta, V., “A Survey of Attacks on Manet Routing Protocols”, International Journal of Innovative Research in Science, Engineering and Technology, vol. 2, no. 6, pp. 2280–2285, (2013)
Vaidya, Binod, et al. “Secure multipath routing scheme for mobile ad hoc network.” Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 163–171, (2007)
C. Tachtatzis and D. Harle, “Performance evaluation of multi-path and single-path routing protocols for mobile ad-hoc networks”, Performance Evaluation of Computer and Telecommunication Systems,2008. SPECTS 2008. International Symposium on, pp. 173–180, (2008)
K. Yu, C. Yu and S. Yan, “An Ad Hoc Routing Protocol with Multiple Backup Routes”, Wireless Personal Communication, vol. 57, no. 4, pp. 533–551, (2011)
Eliana Stavrou, Andreas Pitsillides,”survey on secure multipath routing protocols in WSNs,” Computer Networks, vol. 54, no. 13, pp 2215–2238, (2010)
Mitchell, R., & Chen, R, “A survey of intrusion detection in wireless network applications”, Computer Communications, vol. 42, pp. 1–23, (2014)
Mitchell, R.; Chen, I.-R., “Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems,” in Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, (2015)
Mitchell, R., & Chen, I. R., “Specification based intrusion detection for unmanned aircraft systems”, Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications, pp. 31–36, 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vinoth Kumar, V., Ramamoorthy, S. (2018). Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET. In: Mandal, J., Saha, G., Kandar, D., Maji, A. (eds) Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-6890-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6889-8
Online ISBN: 978-981-10-6890-4
eBook Packages: EngineeringEngineering (R0)