S2AMR: Security- and Stability-Aware Multipath Routing Protocol in MANETs

Article Preview

Abstract:

To achieve survivable communications, it is important to build trusted and stable routes in routing algorithm for mobile ad-hoc networks (MANETs). This paper proposes a multipath routing protocol, the security- and stability-aware multipath routing protocol (S2AMR), locating and preserving the trusted and stable routes in MANETs. In S2AMR, we combine a dynamic trust mechanism with a stability model to satisfy the security requirements and stability requirements, respectively. S2AMR is extended by the AODV protocol, in which a node makes a routing decision based on the trust value on its neighboring nodes and its stability degree, and finally a set of survivable routes are established through the trust value and the stability degree of nodes along these routes. The effectiveness of our approach is validated through extensive simulations.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1184-1189

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] P. Papadimitratos and Z.J. Haas, in: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002, p.27.

Google Scholar

[2] M. Burmester and T. Van Le, in: Proceedings of the Information Technology: Coding and Computing, 2004, p.405.

Google Scholar

[3] A. Valera, W. Seah and S. Rao, in: IEEE transactions on mobile computing, Vol. 4, No. 5 (2005), p.443.

Google Scholar

[4] S. Berton, H. Y in, C. Lin and G. Min, in: Proceedings of the 5th international Conference on Grid and Cooperative Computing, 2006, p.387.

Google Scholar

[5] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, in: Elsevier Ad Hoc Networks, Vol. 5, No. 1 (2007), p.87.

DOI: 10.1016/j.adhoc.2006.05.020

Google Scholar

[6] B. Vaidya and H. Lim, in: Proceedings of the 2009 IEEE Conference on Wireless Communications and Networking, 2009, p.2678.

Google Scholar

[7] W. Lou, W. Liu, Y. Zhang and Y. Fang, in: Wireless Networks, Vol. 15, No. 3 (2009), p.279.

Google Scholar

[8] J. Huang, I. Woungang, H. Chao, M. S. Obaidat, T. Chi and S. K. Dhurandher, in: Proceedings of the IEEE Global Telecommunications Conference, 2011, p.1.

Google Scholar

[9] Q. Hu, J. Zhang, Y. Zhang and Z. Li, in: Journal of Software, Vol. 22, No. 5 (2011), p.1009.

Google Scholar

[10] S. Chen and Meng Wu, in: Journal of Systems Engineering and Electronics, Vol. 22, No. 3 (2011), p.519.

Google Scholar

[11] Y. Dong, T. W. Chim, V. O. K. Li, S.M. Yiu and C. K. Hui, in: Ad Hoc Networks, Vol. 7 (2009), p.1536.

Google Scholar

[12] X. Li, Z. Jia, P. Zhang, R. Zhang and H. Wang, in: IET Information Security, Vol. 4, No. 4, (2010), p.212.

Google Scholar

[13] Y. Cai, H. Li, Z. Li and G. Xie, in: Journal of Software, Vol. 18, No. 3 (2007), p.681.

Google Scholar

[14] S. Peng, W. Jia, G. Wang, J. Wu and M. Guo, in: IEICE Transactions on Information and Systems, Vol. E93-D, No. 3 (2010), p.510.

Google Scholar

[15] Information on http://pcl.cs.ucla.edu/projects/glomosim/

Google Scholar