skip to main content
10.1145/3059336.3059338acmotherconferencesArticle/Chapter ViewAbstractPublication PagesismsiConference Proceedingsconference-collections
research-article

Quality of Service Oriented Secure Routing Model for Mobile Ad hoc Networks

Published: 25 March 2017 Publication History

Abstract

Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to their dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution prevents either a particular attack or provides security at the cost of sacrificing the QoS. In this paper we introduce a model that deploys security in MANETs and takes care of the Quality of Services issues to some extent. We have adopted the concept of analyzing the behavior of the node as we believe that if nodes behave properly and in a coordinated fashion, the insecurity level goes drastically down. Our methodology gives the advantage of using this approach

References

[1]
M.S. Corson, S. Batsell and J. Macker, Architectural considerations for mobile mesh networking (May 1996) Request for comments draft; http://tonnant.itd.nrl.navy.mil/mmnet/mmnetRFC.txt
[2]
S. Singh, M. Woo, and C. S. Raghavendra, "Power-Aware Routing in Mobile Ad Hoc Networks," Proc. MobiCom, 1998, pp. 181--90.
[3]
A. Abdrabou and W. Zhuang, "A Position-Based QoS Routing Scheme for UWB Mobile Ad Hoc Networks," IEEE JSAC, 2006, pp. 850--56.
[4]
D. Kim, C.-H. Min, and S. Kim, "On-Demand SIR and Bandwidth Guaranteed Routing with Transmit Power Assignment in Ad Hoc Mobile Networks," IEEE Trans. Veh. Tech., 2004, pp. 1215--23.
[5]
N. Wisitpongphan et al., "QoS Provisioning using BER-Based Routing in Ad Hoc Wireless Networks," Proc. Vehic. Tech. Conf., 2005, pp. 2483--87.
[6]
Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir R. Das, "Ad hoc On-Demand DistanceVector (AODV) Routing", draft-ietf-manet-aodv-11.txt, June 2002.
[7]
E. M. Royer, and C-K. Toh, "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks", IEEE Personal Communications, April 1999, pp. 46--55
[8]
Z. J. Haas and M. R. Pearlman, The zone routing protocol (ZRP) for ad-hoc networks, Internet draft, Aug. 1998.
[9]
R. Sivakumar, P. Sinha, and V. Bharghavan, "CEDAR: A Core-Extraction Distributed Ad Hoc Routing Algorithm," IEEE JSAC, vol. 17, Aug. 1999, pp. 1454--65.
[10]
S. Lee, G. Ahn, X. Zhang, and A. Campbell, "INSIGNIA: An IP-Based Quality of Service Framework for Mobile ad Hoc Networks," Proc. JPDC, 2000, pp. 374--406.
[11]
L. Chen and W. B. Heinzelman, "QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks", IEEE Journal on SAC, 2005, pp. 561--572.
[12]
P. V. Krishna, V. Saritha, G. Vedha, A. Bhiwal, A.S. Chawla, "Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks", Commun, IET, 2012, pp. 76--83
[13]
S. H. Bouk, I. Sasase, S. H. Ahmed, and N. Javaid, "Gateway Discovery Algorithm Based on Multiple QoS Path Parameters Between Mobile Node and Gateway Node", IEEE JCN, 2012, pp. 434--442.
[14]
C. -C. Hu, E. -H. Kuang Wu and G.-Huey Chen, "Bandwidth-Satisfied Multicast Trees in MANETs", IEEE Transactions On Mobile Computing, 2008, pp. 712--723.
[15]
C. -C. Hu, E. -H. Kuang Wu and G.-Huey Chen, "Bandwidth-Satisfied Multicast Trees in MANETs", IEEE Transactions On Mobile Computing, 2008, pp. 712--723.
[16]
L. C. Llewellyn, K. M. Hopkinson and S. R. Graham, "Distributed Fault-Tolerant Quality of Wireless Networks", IEEE Transactions On Mobile Computing, 2011, pp. 175--190.
[17]
A.S. Nargunam and M.P. Sebastian, "Fully Distributed Cluster Based Routing Architecture for Mobile Ad Hoc Networks,"Proc. IEEE WiMob, 2005, pp. 383--389.
[18]
S. Chen and K. Nahrstedt, "On Finding Multi-Constrained Paths," Proc. ICC, 1998, pp. 874--879.
[19]
R. Ghosh and S. Basagni, "Mitigating the Impact of Node Mobility on Ad Hoc Clustering," WiMob, 2008, pp. 295--308.
[20]
G. Dimitriadis and F.N. Pavlidou, "Clustered Fisheye State Routing for Ad Hoc Wireless Networks," Proc. IEEE MWCN, 2002, pp. 207--211.
[21]
Y.-C. HU, A. Perrig, and D.B. Johnson, "PACKET LEASHES: a defense against wormhole attacks in wireless networks," in Proc. INFOCOM, 2003, pp. 1976--1986.
[22]
Y.-C. HU, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proc. WISE, 2003, pp. 30--40.
[23]
S. Yi, P. Naldurg, and R. Kravets, "A Security-Aware Routing Protocol for Wireless Ad hoc Networks", in Proc. MOBIHOC, 2002 pp. 286--292.
[24]
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields and E. M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," in Proc. ICNP, 2002, pp. 78--87.
[25]
Ming Yu, Mengchu Zhou and Wei Su, "A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments", in Proc. IEEE Vehicular Technology Society, 2009 pp. 449--460.
[26]
Y.C. HU, A. Perrig, and D. B. Johnson, "ARIADNE: a secure on-demand routing protocol for ad hoc networks," in Proc. MOBICOM, 2002, pp. 12--23.
[27]
H. N. Saha, D. Bhattacharyya, A. K. Bandhyopadhyay and P. K. Banerjee, "Two-Level Secure Re-routing (TSR) in Mobile Ad Hoc Networks" Proc. MNCAPPS, 2012 Pages 119--124.

Cited By

View all
  • (2018)An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETsFuture Internet10.3390/fi1002001610:2(16)Online publication date: 5-Feb-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISMSI '17: Proceedings of the 2017 International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence
March 2017
171 pages
ISBN:9781450347983
DOI:10.1145/3059336
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. QoS
  2. System Level

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ISMSI '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETsFuture Internet10.3390/fi1002001610:2(16)Online publication date: 5-Feb-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media