Multipath Routing Protocols for Mobile Ad Hoc
Networks: Security Issues and Performance
Evaluation
Rosa Mavropodi and Christos Douligeris
⋆
University of Piraeus, Department of Informatics,
80 Karaoli & Dimitriou, Piraeus 185 34, Greece
{rosa, cdoulig}@unipi.gr
Abstract. The evolution of wireless network technologies and mobile
computing hardware made possible the introduction of various appli-
cations in mobile ad hoc networks. These applications have increased
requirements regarding security and the acceptable delays in order to
provide high quality services. Multipath routing protocols were designed
to address these challenges. With the use of multiple paths for the com-
munication between a source and a destination, the autonomic user be-
comes almost unaware of a possible network failure, due to security
attacks or link collapses. Several secure multipath routing protocols have
been proposed but little performance information and extensive compar-
isons are available. In this paper, we briefly describe some security issues
that multipath routing protocols face and we evaluate the performance of
three existing secure routing protocols under different traffic conditions
and mobility patterns.
1 Introduction
Mobile ad hoc networks have received great attention in recent years, mainly
due to the evolution of wireless networking and mobile computing hardware
that made possible the introduction of various applications. These applications
have increased requirements in order to ensure high quality for the provided
services. Security in such infrastructureless networks has been proven to be a
challenging task. Multipath routing protocols were initially proposed in order to
design robust and secure networks. The maintenance of multiple routes towards
a destination prevents initiation of a new path discovery from the source node
each time there is a link failure, due to a network fault or a malicious attack. In
addition, the existence of multiple paths may prevent node congestion, since it
may balances the traffic load through alternative routes.
Routing protocols may generally be categorized as table driven (often called
proactive) and source initiated (or on-demand). In table driven protocols
⋆
This work has been supported in part by the IST FET Coordination Action ACCA
(006475).
I. Stavrakakis and M. Smirnov (Eds.): WAC 2005, LNCS 3854, pp. 165–176, 2006.
The original version of this chapter was revised: The copyright line was incorrect.This has been
corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-32993-0 29
© 2006 Springer-Verlag Berlin Heidelberg