Open Access Open Access  Restricted Access Subscription or Fee Access

Secured Multipath Routing Protocol for Black Hole Attacks based on Secret Sharing in MANETs

C. Chandrasekar, S. Padmavathy


Mobile Ad Hoc Network (MANET) is a group of mobile nodes which communicates with each other without any of the supporting infrastructure. Routing in MANET is extremely challenging because of MANETs dynamic features, its limited bandwidth and power energy. Because the intrinsic characteristics of mobile ad hoc networks (MANETs) cause several vulnerabilities, anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns. Most of them are single path or use one path at a time, and the multipath schemes cannot thwart both the passive attacks and active attacks simultaneously. Thus an anonymous multipath routing protocol that is a secured protocol called AOMDV, based on secret sharing is proposed. The protocol provides identity anonymity, location anonymity, data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process. Meanwhile, a hash function is introduced to detect active attacks in the data transmission process. The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks (such as interception and physical destroy attacks). Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.


Multipath Routing, Secret Sharing, Anonymity, AOMDV, Mobile Ad Hoc Network (MANET)

Full Text:



Sapna S. Kaushik, P.R.Deshmukh, “Comparison of effectiveness of AODV, DSDV and DSR Routing Protocols in Mobile Ad hoc Networks”, International Journal of Information Technology and Knowledge Management, 2009, Vol. 2(2), pp.499-502.

L. Zhou, Z. J. Haas. Securing ad hoc networks. IEEE Network, 1999, 13(6): 24–30.

Tsirigos, Z. J. Haas. Analysis of multipath routing, Part 2: mitigation of the effects of frequently changing network topologies. IEEE Trans. on Wireless Communications, 2004, 3(2): 500–511.

K. Sanzgiri, D. LaFlamme, B. Dahill, et al. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2005, 23(3): 598–609.

Vaidya, J. Pyun, J. Park, et al. Secure multipath routing scheme for mobile ad hoc network. Proc. of Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2007: 163–171.

R. Mavropodi, P. Kotzanikolaou, C. Douligeris. SecMR - a secure multipath routing protocol for ad hoc networks. Ad Hoc Networks, 2007, 5(1): 87–99.

W. Lou, W. Liu, Y. Zhang, et al. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 2009, 15(3): 279–294.

Mahesh K.Marina and Samir R.Das,”Adhoc Multipath On Demand Distance Vector Routing”, Published online in Wiley Inter science, 2006. Pages : 969-988.

Asis Nasipuri , Robert Castarida, Samir R. Das,” Performance of Multipath Routing for On- Demand Protocols in Mobile Ad Hoc Networks”, Mobile Networks and Applications 6, 339–349, 2001 © 2001 Kluwer Academic Publishers. Manufactured in The Netherlands.

Y. Zhang, W. Liu, W. Lou, et al. MASK: anonymous on demand routing in mobile ad hoc networks. IEEE Trans. On Wireless Communication, 2006, 5(9): 2376–2385.

D. Takahashi, X. Hong, Y. Xiao. On-demand anonymous routing with distance vector protecting traffic privacy in wireless multi-hop networks. Proc. of 4th International Conference on Mobile Ad-hoc and Sensor Networks, 2008: 145–151.

J. Kong, X. Hong, M. Gerla. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Trans. on Mobile Computing, 2007, 6(8): 888–902.

J. H. Paik, B. H. Kim, D. H. Lee. A3RP: anonymous and authenticate ad hoc routing protocol. Proc. of 2nd International Conference on Information Security and Assurance, 2008: 67–72.

R. Lu, Z. Cao, L. Wang, et al. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Computer Standards and Interfaces, 2007, 29(5): 521–527.

M. Shao, S. Huang. Trust enhanced anonymous routing in mobile ad-hoc networks. Proc. of Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008: 335–341.

H. Aiache, F. Haettel, L. Lebrun, et al. Improving security and performance of an ad hoc network through a multipath routing strategy. Journal in Computer Virology, 2008, 4(4): 267–278.

Y. Dong, T. W. Chim, V. O. K. Li, et al. ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks, 2009, 7(8): 1536– 1550.

D. B. Johnson, D. A. Maltz, Y.C. Hu. The dynamic source routing protocol for mobile Ad Hoc networks (DSR). draftietf- manet-dsr-09.txt, 2003.

Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACM-SE 42, Pp. 96-97, 2004.

B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, Vol. 17, 2006.

R.L.Lagendijik, Jongh, “Multipath Routing in Mobile Ad Hoc Networks”, Traineeship Report, Version 1.2, TU-Delft/TNO, 2003.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.