Modified Topology-Hiding Multipath
Routing Protocol: Solution to the Topology Exposure
Problem in MANET
Presented By:
Akshay S. Phalke
1
Overview
• Introduction
• Objectives
• Literature Survey
• Problem Statement
• Mathematical Model
• System Architecture & Algorithm
• Results
• Conclusion & Future work
• References
2
Introduction
• Mobile ad hoc network is open wireless
network.
• Nodes are in mobile state.
• It is dynamically changing topology and lack
infrastructure network
3
Introduction (contd..)
Fig 1. Introduction Of MANET
4
Objectives
• Hide topology-not carry the link information
in route messages.
• Find node-disjoint routes-After construction of
any route to the destination it advertises the set
of node in that path.
• Exclude unreliable routes-M-THMR able to
detect the malicious as well as faulty node.
5
Literature Survey
6
Problem Statement
• To present the solution for topology exposure
problem and discussed its mitigation
technique.
7
Mathematical Model
8
System Architecture
9
MODIFIED TOPOLOGY-HIDING MULTIPATH
ROUTING PROTOCOL(M-THMR)
• ExNodeSet greatly reduces the probability that a
node is placed on more than one route.
• Every node independently makes routing
decisions by checking the reverse routes.
• Only the nodes that are placed on established
routes needs to rebroadcast the RREP message.
• Only two routes in routing table remains finally,
which means that the established routes are
bidirectional.
10
Proposed System: Algorithm
1.M-THMR:
Algorithm 1: Trust Value Calculation for Secure Route Discovery Mechanism:
• Input: Ti (trust value of nodes)
• Output: FaultNode [ ], TrustNode [ ].
• N [ ] = GetNeighbour[ ];//find all neighboring nodes
• For all node i in N [ ]
• CalculateTrust[ ]// obtain trust
• UpdateTrust () //
• If(Ti<TThreshold)
• FaultNode U node(i)
• else
• TrustNode U node(i)
• End for
11
Algorithm
• Algorithm 2: M-THMR Protocol at node I
• Method1: Route request Phase
• Upon receiving RREQ < S,D, seq, hopCt > from nj :
• if ni == D then
• set a timer TD
• /∗ enter Route Reply Phase upon timeout∗/
• return
• end if
• Insert < S,nj, hopCt + 1 > into RT /∗ reverse route ∗/
• if < S,seq > doesn’t exist in SNT then
• Insert < S,seq > into SNT
• if ni! = D then
• Rebroadcast RREQ < S,D, seq, hopCt + 1 >
• end if
• end if
12
Algorithm
• Method2: Route reply Phase
• Upon receiving RREP < S,D, seq, hopCt,
• exNodeSet, nextNode > from nj :
• for each route R in RT do
• if R.D == S and R.nextHop ∈ exNodeSet then
• Remove route R
• end if
• end for
• if nextNode == NULL or nextNode == ni then
• Insert < D,nj, hopCt + 1 > into RT
• /∗ two temporary parameters ∗/
• Set mHop = 65535 and R1 = NULL
• for each route R in RT do
• if R.D == S and R.hopCount < mHop then
• Set mHop = R.hopCount and R1 = R
• end if
• end for
13
Algorithm
• for each route R in RT do
• /∗ remove all reverse routes to source ∗/
• if R.D == S then
• Remove route R
• end if
• end for
• if R1! = NULL then
• Insert R1 into RT
• nextNode = R1.nextHop
• exNodeSet = {R1.nextHop} ∪ exNodeSet
• Broadcast RREP < S,D, seq, hopCt + 1,
• exNodeSet, nextNode >
• end if
• end if
14
Algorithm
• Method3: Route Probe Phase
• Upon Timeout at the Destination:
• Set exNodeSetmHop = NULL
• for each route R in RT do
• exNodeSet = {R.nextHop} ∪ exNodeSet
• end for
• Broadcast RREP < S,D, 0, exNodeSet,NULL >
15
Implementation Requirement
•Software Requirement:
i.MFS(Meta Exploid Frame Work)
ii.Netscan (Network Scan Tools)
iii.NS 2.35
iv.CAINK (Packet Inspect)
v.VMware player
• OS: Red Hat Enterprise Linux
• OS: a) Back Track b) Kali ( Hacking O.S.)
•Hardware Requirement:
i.512 Mb RAM, 80 GB HDD
ii.2 GHz Processor
iii.Packet Builder Radiator
16
Simulation Parameters
Table No 1. Simulation Parameters
17
Results
18
Results
19
Conclusion
• Proposed System states that
• M-THMR doesn’t degrade the performance
when there is no attack.
• In the adversarial scenario, the simulation
results show that M-THMR can resist attacks.
20
Future Work
• As for the future work, we plan to design the
data transmission strategy with fault detection
mechanism based on M-THMR
21
References
• Yujun Zhang, Guiling Wang, Qi Hu, "Design & Performance Study of a
Topology-Hiding Multipath routing Protocol for Mobile Ad Hoc networks”
IEEE 2014.
• C. K. Toh, A. N. Le, et al. Load balanced routing protocols for ad hoc
mobile wireless networks. IEEE Communications Magazine, 47(8):78–84,
2011.
• M. K. Marina, and S. R. Das. Ad Hoc On-demand Multipath Distance
Vector Routing. Wiley Wireless Communications and Mobile Computing,
6(7):969–988, 2014.
• L. Abusalah, A. Khokhar, et al. A Survey of Secure Mobile Ad Hoc
Routing Protocols. IEEE Communications Surveys and Tutorials,
10(4):78–93, 2013.
• E. Gerhards-Padilla, N. Aschenbruck, et al. Detecting Black Hole Attacks
in Tactical MANETs Using Topology Graphs. IEEE Conference on Local
Computer Networks (LCN), pages 1043–1052, 2011.
22
Thank you
Suggestions Are Welcomed…
23

More Related Content

PPT
Exploring Petri Net State Spaces
PPTX
Learning to Groove with Inverse Sequence Transformations
PPTX
A petri-net
PPTX
Petri Nets: Properties, Analysis and Applications
PDF
Some question for Section C (Embeded )
PDF
TMPA-2017: Evolutionary Algorithms in Test Generation for digital systems
PDF
A Simple Communication System Design Lab #4 with MATLAB Simulink
PDF
Parallel quicksort cz. 1
Exploring Petri Net State Spaces
Learning to Groove with Inverse Sequence Transformations
A petri-net
Petri Nets: Properties, Analysis and Applications
Some question for Section C (Embeded )
TMPA-2017: Evolutionary Algorithms in Test Generation for digital systems
A Simple Communication System Design Lab #4 with MATLAB Simulink
Parallel quicksort cz. 1

What's hot (20)

PPT
Addressing mode and instruction set using 8051
PDF
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
PDF
Some other Importent Question (Mix)
PPT
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
PDF
A Simple Communication System Design Lab #3 with MATLAB Simulink
PDF
Pt 51 kit - Peripheral self-test
PDF
Programmable Logic Array(PLA), digital circuits
PDF
ClockSystem: Embedding Time in Smalltalk
PDF
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
DOCX
Programmable array-logic-and-programmable-logic-array
PPT
microprocessors
PPTX
PopMAG: Pop Music Accompaniment Generation
PDF
Feedback and Control Systems
ODP
Modeling and Mining Sequential Data
PDF
8051 micro controllers Instruction set
PDF
Instruction types
PDF
PDF
Basic openfoa mtutorialsguide
PDF
Pipeline stalling in vhdl
PDF
DickeyS_presentation_2015_3_26_2_1
Addressing mode and instruction set using 8051
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Some other Importent Question (Mix)
Lec14 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Se...
A Simple Communication System Design Lab #3 with MATLAB Simulink
Pt 51 kit - Peripheral self-test
Programmable Logic Array(PLA), digital circuits
ClockSystem: Embedding Time in Smalltalk
Abstract Interpretation meets model checking near the 1000000 LOC mark: Findi...
Programmable array-logic-and-programmable-logic-array
microprocessors
PopMAG: Pop Music Accompaniment Generation
Feedback and Control Systems
Modeling and Mining Sequential Data
8051 micro controllers Instruction set
Instruction types
Basic openfoa mtutorialsguide
Pipeline stalling in vhdl
DickeyS_presentation_2015_3_26_2_1
Ad

Similar to Topology hiding Multipath Routing Protocol in MANET (20)

PDF
Safe Trust Alert Routing in MANET
PDF
Ijcatr04041022
PDF
Lecture 9 10 .mobile ad-hoc routing protocols
PDF
Enhancing performance using TOHIP in MANET
PDF
Opportunistic Data Forwarding in Manet
PDF
(Paper Presentation) DSDV
PDF
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
PDF
Design and development of anonymous location based routing for mobile ad-hoc...
PDF
21 9149 simulation analysis for consistent path identification edit septian
PPTX
Mobile Ad hoc networking
PPTX
Improve MANET network performance using ESPS approach
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
PPT
Ad-HOc presentation
PDF
X RAJKUMAR (1) (1)
PPTX
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
PDF
Position based Opportunistic routing in MANET
Safe Trust Alert Routing in MANET
Ijcatr04041022
Lecture 9 10 .mobile ad-hoc routing protocols
Enhancing performance using TOHIP in MANET
Opportunistic Data Forwarding in Manet
(Paper Presentation) DSDV
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
Design and development of anonymous location based routing for mobile ad-hoc...
21 9149 simulation analysis for consistent path identification edit septian
Mobile Ad hoc networking
Improve MANET network performance using ESPS approach
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Ad-HOc presentation
X RAJKUMAR (1) (1)
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
Position based Opportunistic routing in MANET
Ad

Recently uploaded (20)

PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Measurement Uncertainty and Measurement System analysis
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Applications of Equal_Area_Criterion.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Module 8- Technological and Communication Skills.pptx
First part_B-Image Processing - 1 of 2).pdf
Management Information system : MIS-e-Business Systems.pptx
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
CyberSecurity Mobile and Wireless Devices
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Measurement Uncertainty and Measurement System analysis
Soil Improvement Techniques Note - Rabbi
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Implantable Drug Delivery System_NDDS_BPHARMACY__SEM VII_PCI .pdf

Topology hiding Multipath Routing Protocol in MANET

  • 1. Modified Topology-Hiding Multipath Routing Protocol: Solution to the Topology Exposure Problem in MANET Presented By: Akshay S. Phalke 1
  • 2. Overview • Introduction • Objectives • Literature Survey • Problem Statement • Mathematical Model • System Architecture & Algorithm • Results • Conclusion & Future work • References 2
  • 3. Introduction • Mobile ad hoc network is open wireless network. • Nodes are in mobile state. • It is dynamically changing topology and lack infrastructure network 3
  • 4. Introduction (contd..) Fig 1. Introduction Of MANET 4
  • 5. Objectives • Hide topology-not carry the link information in route messages. • Find node-disjoint routes-After construction of any route to the destination it advertises the set of node in that path. • Exclude unreliable routes-M-THMR able to detect the malicious as well as faulty node. 5
  • 7. Problem Statement • To present the solution for topology exposure problem and discussed its mitigation technique. 7
  • 10. MODIFIED TOPOLOGY-HIDING MULTIPATH ROUTING PROTOCOL(M-THMR) • ExNodeSet greatly reduces the probability that a node is placed on more than one route. • Every node independently makes routing decisions by checking the reverse routes. • Only the nodes that are placed on established routes needs to rebroadcast the RREP message. • Only two routes in routing table remains finally, which means that the established routes are bidirectional. 10
  • 11. Proposed System: Algorithm 1.M-THMR: Algorithm 1: Trust Value Calculation for Secure Route Discovery Mechanism: • Input: Ti (trust value of nodes) • Output: FaultNode [ ], TrustNode [ ]. • N [ ] = GetNeighbour[ ];//find all neighboring nodes • For all node i in N [ ] • CalculateTrust[ ]// obtain trust • UpdateTrust () // • If(Ti<TThreshold) • FaultNode U node(i) • else • TrustNode U node(i) • End for 11
  • 12. Algorithm • Algorithm 2: M-THMR Protocol at node I • Method1: Route request Phase • Upon receiving RREQ < S,D, seq, hopCt > from nj : • if ni == D then • set a timer TD • /∗ enter Route Reply Phase upon timeout∗/ • return • end if • Insert < S,nj, hopCt + 1 > into RT /∗ reverse route ∗/ • if < S,seq > doesn’t exist in SNT then • Insert < S,seq > into SNT • if ni! = D then • Rebroadcast RREQ < S,D, seq, hopCt + 1 > • end if • end if 12
  • 13. Algorithm • Method2: Route reply Phase • Upon receiving RREP < S,D, seq, hopCt, • exNodeSet, nextNode > from nj : • for each route R in RT do • if R.D == S and R.nextHop ∈ exNodeSet then • Remove route R • end if • end for • if nextNode == NULL or nextNode == ni then • Insert < D,nj, hopCt + 1 > into RT • /∗ two temporary parameters ∗/ • Set mHop = 65535 and R1 = NULL • for each route R in RT do • if R.D == S and R.hopCount < mHop then • Set mHop = R.hopCount and R1 = R • end if • end for 13
  • 14. Algorithm • for each route R in RT do • /∗ remove all reverse routes to source ∗/ • if R.D == S then • Remove route R • end if • end for • if R1! = NULL then • Insert R1 into RT • nextNode = R1.nextHop • exNodeSet = {R1.nextHop} ∪ exNodeSet • Broadcast RREP < S,D, seq, hopCt + 1, • exNodeSet, nextNode > • end if • end if 14
  • 15. Algorithm • Method3: Route Probe Phase • Upon Timeout at the Destination: • Set exNodeSetmHop = NULL • for each route R in RT do • exNodeSet = {R.nextHop} ∪ exNodeSet • end for • Broadcast RREP < S,D, 0, exNodeSet,NULL > 15
  • 16. Implementation Requirement •Software Requirement: i.MFS(Meta Exploid Frame Work) ii.Netscan (Network Scan Tools) iii.NS 2.35 iv.CAINK (Packet Inspect) v.VMware player • OS: Red Hat Enterprise Linux • OS: a) Back Track b) Kali ( Hacking O.S.) •Hardware Requirement: i.512 Mb RAM, 80 GB HDD ii.2 GHz Processor iii.Packet Builder Radiator 16
  • 17. Simulation Parameters Table No 1. Simulation Parameters 17
  • 20. Conclusion • Proposed System states that • M-THMR doesn’t degrade the performance when there is no attack. • In the adversarial scenario, the simulation results show that M-THMR can resist attacks. 20
  • 21. Future Work • As for the future work, we plan to design the data transmission strategy with fault detection mechanism based on M-THMR 21
  • 22. References • Yujun Zhang, Guiling Wang, Qi Hu, "Design & Performance Study of a Topology-Hiding Multipath routing Protocol for Mobile Ad Hoc networks” IEEE 2014. • C. K. Toh, A. N. Le, et al. Load balanced routing protocols for ad hoc mobile wireless networks. IEEE Communications Magazine, 47(8):78–84, 2011. • M. K. Marina, and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. Wiley Wireless Communications and Mobile Computing, 6(7):969–988, 2014. • L. Abusalah, A. Khokhar, et al. A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys and Tutorials, 10(4):78–93, 2013. • E. Gerhards-Padilla, N. Aschenbruck, et al. Detecting Black Hole Attacks in Tactical MANETs Using Topology Graphs. IEEE Conference on Local Computer Networks (LCN), pages 1043–1052, 2011. 22
  • 23. Thank you Suggestions Are Welcomed… 23