Minimum energy disjoint path routing in wireless ad-hoc networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Distributed construction of connected dominating set in wireless ad hoc networks
Mobile Networks and Applications - Discrete algorithms and methods for mobile computing and communications
Review: Survey of multipath routing protocols for mobile ad hoc networks
Journal of Network and Computer Applications
Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks
CNSR '11 Proceedings of the 2011 Ninth Annual Communication Networks and Services Research Conference
Neighbor supported reliable multipath multicast routing in MANETs
Journal of Network and Computer Applications
A novel acknowledgment-based approach against collude attacks in MANET
Expert Systems with Applications: An International Journal
Multi-path routing in Spatial Wireless Ad Hoc networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Multipath routing has been proposed to increase resilience against network failures or improve security in Mobile Ad Hoc Networks (MANETs). The Optimized Link State Routing (OLSR) protocol has been adopted by several multipath routing strategies. They implement Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Ideally, the construction of multiple disjoint paths helps to increase resilience against network failures or malicious attacks. However, this is not always possible. In OLSR networks, partial link-state information is generated and flooded exclusively by the MPRs. Therefore, the nodes only obtain a partial view of the network topology. Additionally, flooding disruption attacks may affect either the selection of the MPRs or the propagation of control traffic information. As a consequence, the chances of constructing multiple disjoint paths are reduced. We present a strategy to compute multiple strictly disjoint paths between any two nodes in OLSR-based networks. We provide mechanisms to improve the view of the network topology by the nodes, as well as handling potential flooding disruption attacks to the multipath construction mechanism in OLSR-based networks. We conduct simulations that confirm our claims.