Integrated secure multipath mobile ad hoc network
Issued Date
2010
Issued Date (B.E.)
2553
Available Date
Copyright Date
Resource Type
Series
Edition
Language
eng
File Type
application/pdf
No. of Pages/File Size
xiii, [114] leaves : ill. ; 30 cm.
ISBN
ISSN
eISSN
Other identifier(s)
Identifier(s)
Access Rights
Access Status
Rights
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Rights Holder(s)
Physical Location
National Institute of Development Administration. Library and Information Center
Bibliographic Citation
Citation
Supachote Lertvorratham (2010). Integrated secure multipath mobile ad hoc network. Retrieved from: http://repository.nida.ac.th/handle/662723737/278.
Title
Integrated secure multipath mobile ad hoc network
Alternative Title(s)
Author(s)
Advisor(s)
Editor(s)
item.page.dc.contrubutor.advisor
Advisor's email
Contributor(s)
Contributor(s)
Abstract
The dramatic growth of wireless communication technology today makes wireless equipment affordable and widely used. In a situation where a temporary wireless network needs to be established but fixed-base station is not available, a mobile ad hoc network can be implemented. For implementing a mobile ad hoc network, I realize that there are some challenges. Firstly, most of mobile ad hoc network routings rely on establishment of minimum hops route. I argue in this case that there can be some other metrics, which can be used to establish a better performance and more robust route. Secondly, in many circumstances, wireless networks require security features. My challenge is how to obtain necessary security features with ad hoc network routing. This dissertation is contributed for designing and evaluating mobile ad hoc network routing protocols that are embedded with innovative path measurement techniques and security functions. I proposed two routing protocols in this paper. The first protocol is an on-demand multipath ad hoc network routing protocol called “Predicted Multipath Routing Protocol (PMP)”. The protocol concerns with discovery of a set of routes that have high efficiency and are robust. To measure robustness and efficiency of a route, I proposed two measurements. The first measurement is the Degree of Availability (DA) that anticipates the future survival of a path. It basically predicts the future signal strength of each pair of nodes using regression analysis. The second measurement that measures path efficiency is called “Estimated Path Throughput Value (ETV)”. The ETV relies on the packet loss ratio of link between each pair of nodes. The second protocol is an improvement of the PMP called “Secured Predictive Multipath Routing Protocol (SPMP)”. The design of this protocol is focused on solid security processes to discover secure routes. The protocol is incorporated with three main processes. The first process is node authentication process. The protocol allows a node to authenticate itself either as a group member or as an individual trustful node. The second process is secure route discovery process. This process maintains integrity of routing information during route establishment from a source to a destination. The third process is secure data forwarding process that keeps secrecy of end-to-end data exchange and deliverable path. The SPMP also provides a predefine target receiver technique that enable a node to identify only trusted receivers of route request packets and to limit the maximum number of route request packets not to be exceed the number of node in a network.
Table of contents
Description
Thesis (Ph.D. (Computer Science))--National Institute of Development Administration, 2010