Abstract
Routing protocols in mobile ad hoc and sensor networks discover a multi-hop route between source and destination nodes. A highly reliable path is an important component for enhancing the security of communication. This paper presents RAS: a Reliable routing protocol for enhanced reliability and security of communication in mobile Ad hoc and Sensor networks. Enhanced reliability and security are achieved by the maintenance of a reliability factor by the nodes, which is increased when nodes participate successfully in data transmissions. This is determined through the use of positive and passive acknowledgements. Additional optimizations are included in order to increase the efficiency and performance of the network. Simulation experiments are performed in order to verify the operation of the proposed protocol and evaluate its performance. The results show an improvement in the reliability of the discovered path with the proper choice of certain important reliability parameters.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Perkins, C. E. (2001). Ad hoc networking. Upper Saddle River: Addison-Wesley.
Perkins, C. E., & Royer, E. M. (1998). Ad hoc on demand distance vector (AODV) routing. Internet Draft.
Park, V. D., & Corson, M. S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings IEEE INFOCOM ’97. Sixteenth annual joint conference of the IEEE computer and communications societies, April 1997 (Vol. 3, pp. 1405–1413).
Barry, M., & McGrath, S. (2003). QoS techniques in ad hoc networks. In Proc. of 1st international ANWIRE workshop, Glasgow, April 2003.
Cartigny, J., & Simplot, D. (2003). Border node retransmission based probabilistic broadcast protocols in ad-hoc networks. Telecommunications Systems, 22, 189–204.
Jawhar, I., & Wu, J. (2005). QoS support in TDMA-based mobile ad hoc networks. Journal of Computer Science and Technology, 20(6), 797–910.
Jawhar, I., & Wu, J. (2005). Quality of service routing in mobile ad hoc networks. In M. Cardei, I. Cardei, & D.-Z. Du (Eds.), Theory and applications: Vol. 16. Resource management in wireless networking (pp. 365–400). Berlin: Springer.
Jawhar, I., & Wu, J. (2006). Resource allocation in wireless networks using directional antennas. In The fourth IEEE international conference on pervasive computing and communications (PerCom-06), Pisa, Italy, March 2006 (pp. 318–327). Los Alamitos: IEEE Computer Society.
Liao, W.-H., Wang, S.-L., Sheu, J.-P., & Tseng, Y.-C. (2002). A multi-path QoS routing protocol in a wireless mobile ad hoc network. Telecommunications Systems, 19(3–4), 329–347.
Nelakuditi, S., Zhang, Z.-L., Tsang, R. P., & Du, D. H. C. (2002). Adaptive proportional routing: a localized QoS routing approach. IEEE/ACM Transactions on Networking, 10(6), 790–804.
Wu, J. (2001). A dominating-set-based routing scheme in ad hoc wireless networks. Telecommunications Systems, 18, 13–36. A special issue on wireless networks.
Wu, J. (2003). An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunications Systems, 22, 61–75. A special issue on wireless networks and mobile computing.
Sundaresan, K., Anantharaman, V., Hsieh, H.-Y., & Sivakumar, R. (2005). A reliable transport protocol for ad hoc networks. IEEE Transactions on Mobile Computing, 4(6), 588–603.
Hadim, S., Al-Jaroodi, J., & Mohamed, N. (2006). Trends in middleware for mobile ad hoc networks. The Journal of Communications, 1(4), 11–21.
Ma, R., & Ilow, J. (2003). Reliable multipath routing with fixed delays in Manet using regenerating nodes. In Proc. 28th IEEE international conference on local computer networks (LNC’03), Bonn, Germany, October 2003 (pp. 719–725)
Leung, R., Liu, J., Poon, E., Chan, A.-L., & Li, B. (2001). Mp-dsr: a qos-aware multi-path dynamic source routing protocol for wireless ad-hoc networks. In Proc. 26th IEEE conference on local computer networks (LCN 2001) (pp. 132–141).
Chen, W.-P., & Hou, J. C. (2002). Dynamic, ad-hoc source routing with connection-aware link-state exchange and differentiation. In Proc. IEEE Globecom, November 2002.
Anantvalee, T., & Wu, J. (2007). Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In Proc. of IEEE ICC.
Jamal N., A.-K., & Kamal, A. E. (2006). Enforcing cooperation in mobile ad hoc networks. Wireless Personal Communications.
Rebahi, Y., Mujica-V, V. E., & Sisalem, D. (2005). A reputation-based trust mechanism for ad hoc networks. In Proc. 10th IEEE symposium on computers and communications (ISCC 2005), Spain, June 2005 (pp. 37–42).
Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in dsr based ad-hoc networks. In Proc. IEEE semiannual vehicular technology conference, September 2002 (Vol. VTC-2002).
Kargl, F., Gei, A., Schlott, S., & Weber, M. (2005). Secure dynamic source routing. In Proceedings of the 38th Hawaii international conference on system sciences.
Tsao, T., Alexander, R., Dohler, M., Daza, V., & Lozano, A. (2010). A security framework for routing over low power and lossy networks. IETF draft, draft-tsao-roll-security-framework-02.
Pirzada, A. A., & McDonald, C. (2005). Secure routing with aodv protocol. In Asia-Pacific conference on communications, Perth, Western Australia, October 2005.
Hu, Y.-C., Johnson, D. B., & Perrig, A. (2002). Secure efficient distance vector routing in mobile wireless ad hoc networks. In Proceedings of the 4th IEEE workshop on mobile computing systems and applications (WMCSA’02), June 2002 (pp. 3–13).
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2002). A secure on-demand routing protocol for wireless ad hoc networks. In Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom 2002), September 2002 (pp. 12–23).
Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. (2002). A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE international conference on network protocols (ICNP’02), November 2002 (pp. 78–87).
Acknowledgements
This work was supported in part by UAE University Research grant 04-03-9-11/09.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jawhar, I., Trabelsi, Z. & Al-Jaroodi, J. Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommun Syst 55, 81–91 (2014). https://doi.org/10.1007/s11235-013-9753-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-013-9753-7