T-TOHIP: Trust-based topology-hiding multipath routing in mobile ad hoc network
Tóm tắt
In recent years, security in mobile ad hoc network (MANET) is the active research topic in both industry and academia because of the rising availability of tiny, adapted mobile devices, and the multipath routing protocols have been received much attention in MANET. Accordingly, this paper introduces the trust-based topology-hiding multipath routing algorithm for the MANET. The proposed model finds the security factor of each node in the MANET, and the neighbor nodes are selected based on the defined security factor. The proposed routing method has four models for defining the security factor, namely the trusted model, energy model, delay model, and the mobility model. The proposed multipath routing determines the secured route between the sender and receiver based on the selected neighbor nodes. Finally, data communication is performed through the selected multipath. The performance of the proposed multipath routing is analyzed with the existing methods, such as topology-hiding multipath routing protocol, Fractional lion optimization to topology-hiding multi-path routing, and Adaptive Fractional lion optimization to topology-hiding multi-path routing for the performance metrics, such as throughput, delay, energy, and packet drop rate (PDR). Simulation results show that the proposed multipath routing has the better values of 0.330566, 0.376754, 0.319369, and 0.380559 after 50 s of simulation for throughput, delay, energy, and PDR than the existing models when there is an attack on the node.
Tài liệu tham khảo
Russia S, Anita R (2017) Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network. Wirel Netw 23(7):2307–2316
Kok GX, Chow CO, Xu YH, Ishii H (2013) EAOMDV-MIMC: a multipath routing protocol for multi-interface multi-channel mobile ad-hoc networks. Wirel Pers Commun 73(3):477–504
Chen S, Wu M (2011) Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks. J Syst Eng Electron 22(3):519–527
Kim S (2012) An ant-based multipath routing algorithm for QoS aware mobile ad hoc networks. Wirel Pers Commun 66:739–749
Chintalapalli RM, Ananthula VR (2018) M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network. IET Commun 12(12):1406–1415
Mukhedkar M, Kolekar UD (2017) Implementation of real time secure routing protocol for mobile ad HOC network and AES for disaster affected area. In: Proceedings of the international conference on computing methodologies and communication (ICCMC), pp. 491–496
Shaker Hothefa, Alsaqour Raed (2015) Multipath routing algorithm using an electromagnetic-like mechanism with threshold acceptance for mobile ad hoc networks. Wirel Pers Commun 81(2):607–630
Sheikhan Mansour, Hemmati Ehsan (2012) Transient chaotic neural network-based disjoint multipath routing for mobile ad-hoc networks. Neural Comput Appl 21(6):1403–1412
Muthusenthil B, Murugavalli S (2014) The impact of location based attacks on geographical routing protocols. J Theor Appl Inf Technol 60(2):189–199
Mallapur SV, Patil SR, Agarkhed JV (2017) Load balancing technique for congestion control multipath routing protocol in MANETs. Wirel Pers Commun 92(2):749–770
Das I, Lobiyal DK, Katti CP (2016) Multipath routing in mobile ad hoc network with probabilistic splitting of traffic. Wirel Netw 22(7):2287–2298
Zhang Yujun, Yan Tan, Tian Jie, Hua Qi, Wangb Guiling, Li Zhongcheng (2014) TOHIP: a topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Hoc Netw 21:109–122
Zhang Y, Wang G, Hu Q, Li Z, Tian J (2012) Design and performance study of a topology-hiding multipath routing protocol for mobile ad hoc networks. In: Proceedings of the IEEE conference on INFOCOM, Orlando, FL, USA, 25–30 March, pp 10–18
Nguyen Dang Quan, Toulgoat Mylène, Lamont Louise (2016) Impact of trust-based security association and mobility on the delay metric in MANET. J Commun Netw 18(1):105–111
Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6(2):77–83
Omar M, Challal Y, Bouabdallah A (2012) Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J Netw Comput Appl 35(1):268–286
Huang JW, Woungang I, Chao HC, Obaidat MS (2011) Multi-path trust-based secure AOMDV routing in ad hoc networks. In: Proceedings of the IEEE conference on global telecommunications (GLOBECOM), Kathmandu, Nepal, 5–9 December
Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180
Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232
Basurra SS, De Vos M, Padget J, Ji Y, Lewis T, Armour S (2015) Energy efficient zone based routing protocol for MANETs. Ad Hoc Netw 25(Part A):16–37
Borkar GM, Mahajan AR (2017) A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks. Wirel Netw 23(8):2455–2472
Kokilamani M, Karthikeyan E (2017) An optimal path selection criterion in multi path routing using energy. CSI Trans ICT 5(3):235–246
Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput PP(99):1
Periyasamy P, Karthikeyan E (2017) End-to-end link reliable energy efficient multipath routing for mobile ad hoc networks. Wirel Pers Commun 92(3):825–841
Raj TN, Saranya S, Murugan SA, Bhuvaneswari G (2012) Secured multi path routing with trust establishment using mobile ad hoc networks. Int J Sci Eng Res 3(1):130–134
Shyamala CK, Ashok N, Narayanan B (2015) Trust-based multi-path security scheme for Ad-hoc networks. Int J Comput Technol Appl 8(5):1735–1742
Rajeshwar J, Narsimha G (2017) Secure way routing protocol for mobile ad hoc network. Wirel netw 23(2):345–354
Yadav AK, Tripathi S (2017) QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Netw Appl 10(4):897–909
Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2(5):483–502
Ambekar RK, Kolekar UD (2017) FL-TOHIP: fractional lion optimization to topology-hiding multi-path routing in mobile ad hoc network. J Intell Syst
Ambekar RK, Kolekar UD (2017) AFL-TOHIP: adaptive fractional lion optimization to topology-hiding multi-path routing in mobile ad hoc network. In: Proceedings of international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017), Palladam, India, pp 10–11