Open Access Open Access  Restricted Access Subscription or Fee Access

Improved Multi-Path Secured Routing Protocol

A. Jayanand, Dr.T. Jebarajan

Abstract


Security is one of the major concerns in MANET routing. A large number of routing protocols such as SAODV, Ariadne, EndairA, etc. are designed to secure routing process. A large number of improvements for the existing secured routing protocols are also suggested by various researchers. However they are either insecure for some types of attacks or they consume much computational power which reduces their quality of service. This is because of the fact that all protocols send the identities of source and destination nodes during RREQ or REREP process. An innovative new protocol, named JJ model was introduced by the authors of this paper. The new model has a unique ability to discover the route without identity of source node or destination node which makes it highly efficient and secured comparing with existing models. However, only basic model was explained by the authors. In this paper, we present the next version of JJ model, which contain additional features such as multi-path ability to improve security.

Keywords


Manet, Routing Security, JJ Model, Multi-Path Routing

Full Text:

PDF

References


SK Dwivedi, NK Shukla, Sudhakar Pandey “A hybrid wireless network model for post disaster relief operations” International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012

Pravin Ghosekar, Girish Katkar and Dr. Pradip Ghorpade “Mobile Ad Hoc Networking: Imperatives and Challenges” IJCA Special Issue on “Mobile Ad-hoc Networks”MANETs, 2010

Herv´e Aiache, Fran¸cois Haettel, Laure Lebrun and C´edric Tavernier “Improving Security and Performance of an AdHoc Network through a Multipath Routing Strategy” Journal in Computer Virology, 2008, pp.267-278

Jaspal Kumar, M. Kulkarni And Daya Gupta “Secure Routing Protocols In Ad Hoc Networks: A Review” Special Issue of IJCCT Vol. 2 Issue 2, 3, 4; 2010 for International Conference [ICCT-2010], 3rd-5th December 2010

Ronald Beaubrun and Badji Molo “Using DSR for routing multimedia Traffic in MANETs” International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.1, January 2010

Alekha Kumar Mishra, Bibhu Dutta Sahoo “A Modified Adaptive-Saodv Prototype For Performance Enhancement In Manet” International Journal Of Computer Applications In Engineering, Technology And Sciences (Ij-Ca-Ets) ISSN: 0974-3596 April ‟09 – September ‟09 Volume 1 : Issue 2 Page: 443

M. G. Zapata. ”Secure Ad hoc On-Demand Distance Vector (SAODV) Routing”. Internet Draft: draftguerrero- manet-saodv-04.txt 2002.

Yih-Chun Hu, Adrian Perrig And David B. Johnson “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks”Wireless Networks 11, 21–38, 2005

Abidin, A.F.A, Usop, N.S.M, & N.H.N. Zulkifli. ( 2010) “An Analysis on Endaira:A Provably Secure On-Demand Source Routing Protocol” International Journal on Computer Science and Engineering, Vol. 02, No. 03. 437-442.

N.Jaisankar and R.Saravanan “An Extended AODV Protocol for Multipath Routing in MANETs” IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 2010 ISSN: 1793-8236

V.C . Patil, Rajashree. V. Biradar, R. R. Mudholkar and S. R. Sawant “On-Demand Multipath Routing Protocols for Mobile Ad Hoc Networks Issues and Comparison” International Journal of Wireless Communication and Simulation Volume 2 Number 1 (2010), pp. 21–38

A.Jayanand, Dr.T.Jeba Rajan “A Secured Routing Protocol for MANETs” International Journal for Computer Science Engineering and Technology IJCSET August 2012 Vol 2, Issue 8, 1354-1358

Adam Burg “Ad hoc network specific attacks” Seminar Ad hoc networking: concepts, applications, and security Technische Universität München, 2003

K.P.Manikandan, Dr.R.Satyaprasad and Dr.K.Rajasekhararao “A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011

Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay “Different Types of Attacks on Integrated MANET-Internet Communication” International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3)


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.