Skip to main content

Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET

  • Conference paper
  • First Online:
Proceedings of the International Conference on Computing and Communication Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 24))

Abstract

A Mobile Ad hoc Network (MANET) is a formation of the dynamic network with a group of mobile nodes and communicating through wireless links. The key issue of the mobile MANET is lack of infrastructure and resource constraint that causes fault node. Hence, MANET is exposed to dangerous attacks. In order to improve the secure routing in the network and reduce hazards by fault nodes, we enhance the existing protocol Ad hoc On-Demand Multipath Distance Vector (AOMDV) and designed routing protocol named Trusted Security Adhoc On-Demand Multipath Distance Vector (TS-AOMDV). The TS-AOMDV protocol finding and removing fault node attacks like flooding, blackhole, and grayhole attacks in the network. The detection and segregation of attacks done by using IDS and secure routing in route finding and data transmission phases. An IDS monitor data and control packets those participated in data transmission and route finding phases. In order to enhance the performance of routing in the MANET, An IDS combines and calculate data in the AOMDV for detecting attacks. This improves the TS-AOMDV to give a better performance of routing and protection in MANET. At last, the proposed protocol TS-AOMDV is evaluated with obtainable protocol AOMDV, the performance is analyzed by using the NS-2 simulator and improves routing performance like throughput by 59.1%. The result observed from a simulation that the proposed method enhances the performance of routing like as end-to-end delay, throughput, control overhead, and packet delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Erciyes, K. “Distributed Graph Algorithms for Computer Networks”, Computer Communications and Networks, London: Springer, pp. 259–275, (2013)

    Google Scholar 

  2. S. Abdel Hamid, H. Hassanein and G. Takahara, “Routing for Wireless Multi-Hop Networks: Unifying Features”, SpringerBriefs in Computer Science, pp. 11–23, (2013)

    Google Scholar 

  3. Hamid, S. A., Hassanein, H., & Takahara, G., “Routing for Wireless Multi Hop Networks–Unifying and Distinguishing Features”, School of Comp.—Queen’s University, Canada, report 583, (2011)

    Google Scholar 

  4. Habib, S., Saleem, S., & Saqib, K. M., “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCOReD, pp. 529–533, (2013)

    Google Scholar 

  5. A. Ahmed, K. Abu Bakar, M. Channa, K. Haseeb and A. Khan, “A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks”, Frontiers of Computer Science, vol. 9, no. 2, pp. 280–296, (2015)

    Google Scholar 

  6. I. Abdel-Halim, H. Fahmy and A. Bahaa-Eldin, “Agent-based trusted on-demand routing protocol for mobile ad-hoc networks”, Wireless Netw, vol. 21, no. 2, pp. 467–483, (2015)

    Google Scholar 

  7. Mahmoud, Mohamed MEA, and Xuemin Sherman Shen. “Secure routing protocols.” Security for Multi-hop Wireless Networks. Springer International Publishing, pp. 63–93, (2014)

    Google Scholar 

  8. Shanmuganathan, V., and T. Anand. “A Survey on Gray Hole Attack in MANET.” IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), pp. 2250–3501, (2012)

    Google Scholar 

  9. Tayal, S., & Gupta, V., “A Survey of Attacks on Manet Routing Protocols”, International Journal of Innovative Research in Science, Engineering and Technology, vol. 2, no. 6, pp. 2280–2285, (2013)

    Google Scholar 

  10. Vaidya, Binod, et al. “Secure multipath routing scheme for mobile ad hoc network.” Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 163–171, (2007)

    Google Scholar 

  11. C. Tachtatzis and D. Harle, “Performance evaluation of multi-path and single-path routing protocols for mobile ad-hoc networks”, Performance Evaluation of Computer and Telecommunication Systems,2008. SPECTS 2008. International Symposium on, pp. 173–180, (2008)

    Google Scholar 

  12. K. Yu, C. Yu and S. Yan, “An Ad Hoc Routing Protocol with Multiple Backup Routes”, Wireless Personal Communication, vol. 57, no. 4, pp. 533–551, (2011)

    Google Scholar 

  13. Eliana Stavrou, Andreas Pitsillides,”survey on secure multipath routing protocols in WSNs,” Computer Networks, vol. 54, no. 13, pp 2215–2238, (2010)

    Google Scholar 

  14. Mitchell, R., & Chen, R, “A survey of intrusion detection in wireless network applications”, Computer Communications, vol. 42, pp. 1–23, (2014)

    Google Scholar 

  15. Mitchell, R.; Chen, I.-R., “Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems,” in Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, (2015)

    Google Scholar 

  16. Mitchell, R., & Chen, I. R., “Specification based intrusion detection for unmanned aircraft systems”, Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications, pp. 31–36, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Vinoth Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vinoth Kumar, V., Ramamoorthy, S. (2018). Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET. In: Mandal, J., Saha, G., Kandar, D., Maji, A. (eds) Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6890-4_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6889-8

  • Online ISBN: 978-981-10-6890-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics