Integrated secure multipath mobile ad hoc network

dc.contributor.advisorPipat Hiranvanichakorn, advisorth
dc.contributor.authorSupachote Lertvorrathamth
dc.descriptionThesis (Ph.D. (Computer Science))--National Institute of Development Administration, 2010th
dc.description.abstractThe dramatic growth of wireless communication technology today makes wireless equipment affordable and widely used. In a situation where a temporary wireless network needs to be established but fixed-base station is not available, a mobile ad hoc network can be implemented. For implementing a mobile ad hoc network, I realize that there are some challenges. Firstly, most of mobile ad hoc network routings rely on establishment of minimum hops route. I argue in this case that there can be some other metrics, which can be used to establish a better performance and more robust route. Secondly, in many circumstances, wireless networks require security features. My challenge is how to obtain necessary security features with ad hoc network routing. This dissertation is contributed for designing and evaluating mobile ad hoc network routing protocols that are embedded with innovative path measurement techniques and security functions. I proposed two routing protocols in this paper. The first protocol is an on-demand multipath ad hoc network routing protocol called “Predicted Multipath Routing Protocol (PMP)”. The protocol concerns with discovery of a set of routes that have high efficiency and are robust. To measure robustness and efficiency of a route, I proposed two measurements. The first measurement is the Degree of Availability (DA) that anticipates the future survival of a path. It basically predicts the future signal strength of each pair of nodes using regression analysis. The second measurement that measures path efficiency is called “Estimated Path Throughput Value (ETV)”. The ETV relies on the packet loss ratio of link between each pair of nodes. The second protocol is an improvement of the PMP called “Secured Predictive Multipath Routing Protocol (SPMP)”. The design of this protocol is focused on solid security processes to discover secure routes. The protocol is incorporated with three main processes. The first process is node authentication process. The protocol allows a node to authenticate itself either as a group member or as an individual trustful node. The second process is secure route discovery process. This process maintains integrity of routing information during route establishment from a source to a destination. The third process is secure data forwarding process that keeps secrecy of end-to-end data exchange and deliverable path. The SPMP also provides a predefine target receiver technique that enable a node to identify only trusted receivers of route request packets and to limit the maximum number of route request packets not to be exceed the number of node in a
dc.format.extentxiii, [114] leaves : ill. ; 30
dc.publisherNational Institute of Development Administrationth
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International
dc.subject.lccTK 5105.77 Su76 2010th
dc.subject.otherAd hoc networks (Computer networks)th
dc.subject.otherRouting protocols (Computer network protocols)th
dc.subject.otherComputer networks -- Security measuresth
dc.subject.otherComputer network protocolsth
dc.titleIntegrated secure multipath mobile ad hoc networkth
dc.typetext--thesis--doctoral thesisth
mods.physicalLocationNational Institute of Development Administration. Library and Information Centerth of Applied Statisticsth Scienceth Institute of Development Administrationth of Philosophyth
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
14.62 MB
Adobe Portable Document Format
Full Text