An intelligent scheme of secure routing for mobile ad hoc networks

Zhang, Zhongwei ORCID: (2009) An intelligent scheme of secure routing for mobile ad hoc networks. In: ICSPCS 2008: 2nd International Conference on Signal Processing and Communication Systems, 15-17 Dec 2008, Gold Coast, Australia.

PDF (Published Version)

Download (141kB)
PDF (Documentation)

Download (408kB)


An ad hoc network is a peer-to-peer network without no centralised server. Mobile Ad Hoc Network(MANETs)is a promising new wireless communications paradigm in which network device may move around and end hosts may function as a router. It is a key of success of being deployed to properly address the security problems. Although many research focus on how to deliver packets from one node to another, research into the security will surely overtake the trend and play the leading role. Current techniques of addressing security on the fixed structured wired network are only useful to protect the transmitted message on the end nodes, the security of routing information among the mobile nodes in the hostile environment where mobile Ad Hoc
networks are usually used [4] has been inadequately addressed.

Security and routing on the wired networks have been treated separately due to that Security is concerned with how to defend nodes from hackers attack, while routing is about how to efficiently determine optimal routes. Recent research shown that the security and routing on mobile Ad hoc networks need to be considered altogether, that is, the routing needs to be done with the capability of preventing various attacks from compromised or malicious nodes.

Towards a solution of secure routing on MANETs, we discuss
a new scheme, which is reliant on the fuzzy logic, capable of determining the most secure route during the routing discovery in this paper. Similar to the AODV or SAODV in the route discovery, the algorithm will decide a secure path among all the possible routing paths based on the knowledge about its neighbour nodes. The nodes will forward or reply the route with the highest security level. The feasibility of the proposed scheme
of secure routing will be demonstrated by using simulation on NS2. In addition, the performance of the new secure routing protocol on the simulation experiments are presented.

Statistics for USQ ePrint 4465
Statistics for this ePrint Item
Item Type: Conference or Workshop Item (Commonwealth Reporting Category E) (Poster)
Refereed: Yes
Item Status: Live Archive
Additional Information: © 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Faculty/School / Institute/Centre: Historic - Faculty of Sciences - Department of Maths and Computing (Up to 30 Jun 2013)
Faculty/School / Institute/Centre: Historic - Faculty of Sciences - Department of Maths and Computing (Up to 30 Jun 2013)
Date Deposited: 15 Apr 2009 00:40
Last Modified: 02 Jul 2013 23:07
Uncontrolled Keywords: mobile ad hoc networks; dynamic routing protocols; AODV; secure routing protocol; NS2
Fields of Research (2008): 08 Information and Computing Sciences > 0805 Distributed Computing > 080502 Mobile Technologies
08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
10 Technology > 1005 Communications Technologies > 100510 Wireless Communications
Fields of Research (2020): 46 INFORMATION AND COMPUTING SCIENCES > 4606 Distributed computing and systems software > 460608 Mobile computing
46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified
40 ENGINEERING > 4006 Communications engineering > 400608 Wireless communication systems and technologies (incl. microwave and millimetrewave)
Socio-Economic Objectives (2008): E Expanding Knowledge > 97 Expanding Knowledge > 970108 Expanding Knowledge in the Information and Computing Sciences
Identification Number or DOI:

Actions (login required)

View Item Archive Repository Staff Only