Abstract
The dynamic nature of mobile nodes of ad hoc network is mostly affected by security problems which reduce data forwarding rate in multimedia sources. Due to the rapid growth of wireless applications, the different multitalented routing protocols are proposed in recent years. But the recent protocols are not efficient for multimedia applications, till now, specific security aware routing protocols are not proposed for multimedia data transfers. In this paper, we proposed trust enhanced cluster based multipath routing (TECM) algorithm. We use energy efficient PSO algorithm used to create cluster formation and cluster head, super cluster head are selected from trust values, which compute form proposed TECM algorithm. The multi trust factors are used for trust computation, such as frame/packet loss ratio, frame/packet forward energy, frame/packet receiving energy, routing overhead, received signal strength, frame/packet forward rate, average forward delay and protocol deviation flag. We then combine proposed TECM algorithm with standard multipath OLSR protocol (TECM-OLSR) to analyze the performance of proposed algorithm. The simulated results show that proposed TECM-OLSR protocol is very effective in terms of loss and delivery rate, delay, routing overhead and network lifetime compare to FPNT-OLSR.
Similar content being viewed by others
References
Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., et al. (2008). Network science based approaches to design and analyze MANETs for military applications. IEEE Communications Magazine, 46(11), 55–61.
Boukerche, A., Zarrad, A., & Araujo, R. (2010). A cross-layer approach-based Gnutella for collaborative virtual environments over mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(7), 911–924.
Flores-Cortés, C., Blair, G., & Grace, P. (2007). An adaptive middleware to overcome service discovery heterogeneity in mobile ad hoc environments. IEEE Distributed Systems Online, 8(7), 1.
Tseng, Y.-C., Shen, C.-C., & Chen, W.-T. (2003). Integrating mobile IP with ad hoc networks. Computer, 36(5), 48–55.
Khalid, A., Ahn, H., & Kim, C. (2016). Reliable and efficient multi-rate aware reactive (REMAR) routing for IEEE 802.11 based MANET. In 2016 international conference on information networking (ICOIN).
Young, W., Remley, K., Holloway, C., Koepke, G., Camell, D., Ladbury, J., et al. (2014). Radiowave propagation in urban environments with application to public-safety communications. IEEE Antennas and Propagation Magazine, 56(4), 88–107.
Maison, R., Steen, D., Zakrzewicz, M., & Biniek, Z. (2011). Monitoring high performance data streams in vertical markets: Theory and applications in public safety and healthcare. Bell Labs Technical Journal, 16(3), 163–179.
Clausen, T., Dearlove, C., & Jacquet, P. (2014). The optimized link state routing protocol, version 2, IETF RFC7181 (pp. 1–115).
Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.
Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58(5), 2471–2481.
Abbas, A. (2010). Analysis of multiple attempt multipath routing for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 5(3), 163.
Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.
Zouridaki, C., Mark, B., & Hejmo, M. (2007). Byzantine robust trust establishment for mobile ad hoc networks. Telecommunication Systems, 35(3–4), 189–206.
Bononi, L., & Tacconi, C. (2007). Intrusion detection for secure clustering and routing in mobile multi-hop wireless networks. International Journal of Information Security, 6(6), 379–392.
Cao Trong, H., & Choong Seon, H. (2011). RAI: A high throughput routing protocol for multi-hop multi-rate ad hoc networks. Wireless Personal Communications, 60(1), 69–82.
Chatterjee, P., Sengupta, I., & Ghosh, S. (2012). STACRP: A secure trusted auction oriented clustering based routing protocol for MANET. Cluster Computing, 15(3), 303–320.
Abbas, S., Merabti, M., Llewellyn-Jones, D., & Kifayat, K. (2013). Lightweight sybil attack detection in MANETs. IEEE Systems Journal, 7(2), 236–248.
Ming, Yu., Zhou, M., & Wei, S. (2009). A secure routing protocol against byzantine attacks in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1), 449–460.
Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P., & Aschenbruck, N. (2015). Identification of contamination zones for sinkhole detection in MANETs. Journal of Network and Computer Applications, 54, 62–77.
Su, M. (2010). WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Computers & Security, 29(2), 208–224.
Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77.
Schweitzer, N., Stulman, A., Shabtai, A., & Margalit, R. (2016). Mitigating denial of service attacks in OLSR protocol using fictitious nodes. IEEE Transactions on Mobile Computing, 15(1), 163–172.
Marimuthu, M., & Krishnamurthi, I. (2013). Enhanced OLSR for defense against DOS attack in ad hoc networks. Journal of Communications and Networks, 15(1), 31–37.
Laxmi, V., Lal, C., Gaur, M., & Mehta, D. (2015). JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. Journal of Information Security and Applications, 22, 99–112.
Adnane, A., Bidan, C., & de Sousa Júnior, R. (2013). Trust-based security for the OLSR routing protocol. Computer Communications, 36(10–11), 1159–1171.
Swathi, G., & Saravanan, R. (2014). Secure routing in MANET using synchronization and data authencity. Cybernetics and Information Technologies. https://doi.org/10.2478/cait-2014-0016.
Vamsi, P., Batra, P., & Kant, K. (2014). BT-GPSR: An integrated trust model for secure geographic routing in wireless sensor networks. In Students conference on engineering and systems.
Leinmüller, T., Maihöfer, C., Schoch, E., & Kargl, F. (2006). Improved security in geographic ad hoc routing through autonomous position verification. In Proceedings of the 3rd international workshop on vehicular ad hoc networks—VANET ‘06.
Koutsonikolas, D., Das, S., Hu, Y., & Stojmenovic, I. (2008). Hierarchical geographic multicast routing for wireless sensor networks. Wireless Networks, 16(2), 449–466.
El Defrawy, K., & Tsudik, G. (2011). ALARM: Anonymous location-aided routing in suspicious MANETs. IEEE Transactions on Mobile Computing, 10(9), 1345–1358.
Chen, Q., Kanhere, S., & Hassan, M. (2013). Adaptive position update for geographic routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 12(3), 489–501.
Defrawy, K., & Tsudik, G. (2011). Privacy-preserving location-based on-demand routing in MANETs. IEEE Journal on Selected Areas in Communications, 29(10), 1926–1934.
Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.
Xia, H., Sha, E., & Jia, Z. (2014). Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Information Security, 8(2), 88–103.
Kuchaki Rafsanjani, M., & Fatemidokht, H. (2015). FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU—International Journal of Electronics and Communications, 69(11), 1613–1621.
Tan, S., Li, X., & Dong, Q. (2015). Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Networks, 30, 84–98.
Devi, V. S., & Hegde, N. P. (2016). Energy efficient multipath routing protocol for enhancing QoS and QoE in multimedia applications for MANETS. International Journal of Communication Networks and Information Security (IJCNIS), 8(3), 158–170.
Heinzelman, W., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Devi, V.S., Hegde, N.P. Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer. Wireless Pers Commun 100, 923–940 (2018). https://doi.org/10.1007/s11277-018-5358-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5358-5