Skip to main content

Advertisement

Log in

Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The dynamic nature of mobile nodes of ad hoc network is mostly affected by security problems which reduce data forwarding rate in multimedia sources. Due to the rapid growth of wireless applications, the different multitalented routing protocols are proposed in recent years. But the recent protocols are not efficient for multimedia applications, till now, specific security aware routing protocols are not proposed for multimedia data transfers. In this paper, we proposed trust enhanced cluster based multipath routing (TECM) algorithm. We use energy efficient PSO algorithm used to create cluster formation and cluster head, super cluster head are selected from trust values, which compute form proposed TECM algorithm. The multi trust factors are used for trust computation, such as frame/packet loss ratio, frame/packet forward energy, frame/packet receiving energy, routing overhead, received signal strength, frame/packet forward rate, average forward delay and protocol deviation flag. We then combine proposed TECM algorithm with standard multipath OLSR protocol (TECM-OLSR) to analyze the performance of proposed algorithm. The simulated results show that proposed TECM-OLSR protocol is very effective in terms of loss and delivery rate, delay, routing overhead and network lifetime compare to FPNT-OLSR.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., et al. (2008). Network science based approaches to design and analyze MANETs for military applications. IEEE Communications Magazine, 46(11), 55–61.

    Article  Google Scholar 

  2. Boukerche, A., Zarrad, A., & Araujo, R. (2010). A cross-layer approach-based Gnutella for collaborative virtual environments over mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(7), 911–924.

    Article  Google Scholar 

  3. Flores-Cortés, C., Blair, G., & Grace, P. (2007). An adaptive middleware to overcome service discovery heterogeneity in mobile ad hoc environments. IEEE Distributed Systems Online, 8(7), 1.

    Article  Google Scholar 

  4. Tseng, Y.-C., Shen, C.-C., & Chen, W.-T. (2003). Integrating mobile IP with ad hoc networks. Computer, 36(5), 48–55.

    Article  Google Scholar 

  5. Khalid, A., Ahn, H., & Kim, C. (2016). Reliable and efficient multi-rate aware reactive (REMAR) routing for IEEE 802.11 based MANET. In 2016 international conference on information networking (ICOIN).

  6. Young, W., Remley, K., Holloway, C., Koepke, G., Camell, D., Ladbury, J., et al. (2014). Radiowave propagation in urban environments with application to public-safety communications. IEEE Antennas and Propagation Magazine, 56(4), 88–107.

    Article  Google Scholar 

  7. Maison, R., Steen, D., Zakrzewicz, M., & Biniek, Z. (2011). Monitoring high performance data streams in vertical markets: Theory and applications in public safety and healthcare. Bell Labs Technical Journal, 16(3), 163–179.

    Article  Google Scholar 

  8. Clausen, T., Dearlove, C., & Jacquet, P. (2014). The optimized link state routing protocol, version 2, IETF RFC7181 (pp. 1–115).

  9. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.

    Article  Google Scholar 

  10. Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58(5), 2471–2481.

    Article  Google Scholar 

  11. Abbas, A. (2010). Analysis of multiple attempt multipath routing for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 5(3), 163.

    Article  Google Scholar 

  12. Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.

    Article  Google Scholar 

  13. Zouridaki, C., Mark, B., & Hejmo, M. (2007). Byzantine robust trust establishment for mobile ad hoc networks. Telecommunication Systems, 35(3–4), 189–206.

    Article  Google Scholar 

  14. Bononi, L., & Tacconi, C. (2007). Intrusion detection for secure clustering and routing in mobile multi-hop wireless networks. International Journal of Information Security, 6(6), 379–392.

    Article  Google Scholar 

  15. Cao Trong, H., & Choong Seon, H. (2011). RAI: A high throughput routing protocol for multi-hop multi-rate ad hoc networks. Wireless Personal Communications, 60(1), 69–82.

    Article  Google Scholar 

  16. Chatterjee, P., Sengupta, I., & Ghosh, S. (2012). STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15(3), 303–320.

    Article  Google Scholar 

  17. Abbas, S., Merabti, M., Llewellyn-Jones, D., & Kifayat, K. (2013). Lightweight sybil attack detection in MANETs. IEEE Systems Journal, 7(2), 236–248.

    Article  Google Scholar 

  18. Ming, Yu., Zhou, M., & Wei, S. (2009). A secure routing protocol against byzantine attacks in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1), 449–460.

    Article  Google Scholar 

  19. Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P., & Aschenbruck, N. (2015). Identification of contamination zones for sinkhole detection in MANETs. Journal of Network and Computer Applications, 54, 62–77.

    Article  Google Scholar 

  20. Su, M. (2010). WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Computers & Security, 29(2), 208–224.

    Article  Google Scholar 

  21. Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77.

    Article  Google Scholar 

  22. Schweitzer, N., Stulman, A., Shabtai, A., & Margalit, R. (2016). Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Transactions on Mobile Computing, 15(1), 163–172.

    Article  Google Scholar 

  23. Marimuthu, M., & Krishnamurthi, I. (2013). Enhanced OLSR for defense against DOS attack in ad hoc networks. Journal of Communications and Networks, 15(1), 31–37.

    Article  Google Scholar 

  24. Laxmi, V., Lal, C., Gaur, M., & Mehta, D. (2015). JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. Journal of Information Security and Applications, 22, 99–112.

    Article  Google Scholar 

  25. Adnane, A., Bidan, C., & de Sousa Júnior, R. (2013). Trust-based security for the OLSR routing protocol. Computer Communications, 36(10–11), 1159–1171.

    Article  Google Scholar 

  26. Swathi, G., & Saravanan, R. (2014). Secure routing in MANET using synchronization and data authencity. Cybernetics and Information Technologies. https://doi.org/10.2478/cait-2014-0016.

    Google Scholar 

  27. Vamsi, P., Batra, P., & Kant, K. (2014). BT-GPSR: An integrated trust model for secure geographic routing in wireless sensor networks. In Students conference on engineering and systems.

  28. Leinmüller, T., Maihöfer, C., Schoch, E., & Kargl, F. (2006). Improved security in geographic ad hoc routing through autonomous position verification. In Proceedings of the 3rd international workshop on vehicular ad hoc networksVANET ‘06.

  29. Koutsonikolas, D., Das, S., Hu, Y., & Stojmenovic, I. (2008). Hierarchical geographic multicast routing for wireless sensor networks. Wireless Networks, 16(2), 449–466.

    Article  Google Scholar 

  30. El Defrawy, K., & Tsudik, G. (2011). ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Transactions on Mobile Computing, 10(9), 1345–1358.

    Article  Google Scholar 

  31. Chen, Q., Kanhere, S., & Hassan, M. (2013). Adaptive position update for geographic routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 12(3), 489–501.

    Article  Google Scholar 

  32. Defrawy, K., & Tsudik, G. (2011). Privacy-preserving location-based on-demand routing in MANETs. IEEE Journal on Selected Areas in Communications, 29(10), 1926–1934.

    Article  Google Scholar 

  33. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.

    Article  Google Scholar 

  34. Xia, H., Sha, E., & Jia, Z. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.

    Article  Google Scholar 

  35. Kuchaki Rafsanjani, M., & Fatemidokht, H. (2015). FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU—International Journal of Electronics and Communications, 69(11), 1613–1621.

    Article  Google Scholar 

  36. Tan, S., Li, X., & Dong, Q. (2015). Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Networks, 30, 84–98.

    Article  Google Scholar 

  37. Devi, V. S., & Hegde, N. P. (2016). Energy efficient multipath routing protocol for enhancing QoS and QoE in multimedia applications for MANETS. International Journal of Communication Networks and Information Security (IJCNIS), 8(3), 158–170.

  38. Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vallala Sowmya Devi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, V.S., Hegde, N.P. Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer. Wireless Pers Commun 100, 923–940 (2018). https://doi.org/10.1007/s11277-018-5358-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5358-5

Keywords

Navigation