Advertisement

Cluster Computing

, Volume 22, Supplement 1, pp 255–264 | Cite as

Triple referee incentive mechanism for secure mobile adhoc networks

  • T. R. VedhavathyEmail author
  • M. S. K. Manikandan
Article

Abstract

In MANETs, the mobile nodes usually relay other nodes’ packets for the proper operation of the network. However, selfish nodes usually don’t cooperate in relaying other nodes’ packets but use the regular nodes to relay their packets. The increase in the number of selfish nodes affects the network performance badly. Existing protocols try to minimize the impact of selfish nodes with high computation overhead and/or communication overhead. In this paper, triple referee incentive mechanism is proposed that employs three referees to monitor the behavior of any intermediate node. In case of any selfish behavior, the packets will be bypassed through the referee nodes so that the data communication is uninterrupted in the network. In addition, the selfish nodes are motivated through incentives with less packet overhead. Hash operations are used in the data packets and acknowledgement packets instead of the public key cryptography operations so that the average packet overhead is less than that of the public key cryptography based incentive protocols. Hash values are used to attain payment non repudiation and restrain free riding attacks.

Keywords

Selfish nodes Incentive schemes Cooperation enforcement Referee nodes 

References

  1. 1.
    Li, X., Seet, B., Chong, P.: Multihop cellular networks: technology and economics. Comput. Netw. 52(9), 1825–1837 (2008)CrossRefzbMATHGoogle Scholar
  2. 2.
    Shen, G., Liu, J., Wang, D., Wang, J., Jin, S.: Multi-hop relay for next-generation wireless access networks. Bell Labs Tech. J. 13(4), 175–193 (2009)CrossRefGoogle Scholar
  3. 3.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th Annual International Conference on Mobile Computing, pp. 255–265 (2000)Google Scholar
  4. 4.
    Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: European Wireless Conference (2002)Google Scholar
  5. 5.
    Jaramillo, J., Srikant, R.: DARWIN: distributed and adaptive reputation mechanism for wireless networks. In: Proceedings of 13th Annual ACM International Conference on Mobile Computing, pp. 87–98 (2007)Google Scholar
  6. 6.
    Jiang, N., Hua, K., Liu, D.: A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks. J. Commun. Netw. 9(1), 56–66 (2007)CrossRefGoogle Scholar
  7. 7.
    Buttyan, L., Hubaux, J.: Nuglets: A virtual currency to stimulate cooperation in self organized ad hoc networks. Technical Report DSC/2001/001. Swiss Federal Inst Of Technology (2001)Google Scholar
  8. 8.
    Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, creditbased system for mobile ad-hoc networks. Proc. IEEE INFOCOM 3, 1987–1997 (2003)Google Scholar
  9. 9.
    Mahmoud, M., Shen, X.: DSC: cooperation incentive mechanism for multi-hop cellular networks. Proc. IEEE Int’l Conf. Comm. (ICC ’09), pp. 569–574 (2009)Google Scholar
  10. 10.
    Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wireless Comm. 8(4), 1974–1983 (2009)CrossRefGoogle Scholar
  11. 11.
    Hu, J.: Cooperation in Mobile Ad Hoc Networks. Technical Report TR-050111, Computer Science Dept., Florida State Univ. (2005)Google Scholar
  12. 12.
    Marias, G., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mobile Comput. 6(3), 319–332 (2006)CrossRefGoogle Scholar
  13. 13.
    Jaramillo, J., Srikant, R.: DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks. In: Proc. ACM Mobile Computing, pp. 87–98 (2007)Google Scholar
  14. 14.
    He, Q., Wu, D., Khosla, P.: A secure incentive architecture for ad-hoc networks. Wirel. Commun. Mobile Comput. 6(3), 333–346 (2006)CrossRefGoogle Scholar
  15. 15.
    Jiang, N., Hua, K., Liu, D.: A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks. Commun. Networks 9(1), 56–66 (2007)CrossRefGoogle Scholar
  16. 16.
    Xie, L., Zhu, S.: Message dropping attacks in overlay networks: attack detection and attacker identification. ACM Trans. Inf. Syst. Secur. 11(3), 1–10 (2008)CrossRefGoogle Scholar
  17. 17.
    Buttyan, L., Hubaux, J.: Nuglets: A Virtual Currency to Stimulate Cooperation in Self Organized Ad Hoc Networks. Technical Report DSC/2001/001, Swiss Federal Inst. of Technology (2001)Google Scholar
  18. 18.
    Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2004)CrossRefGoogle Scholar
  19. 19.
    Weyland, A., Braun, T.: Cooperation and accounting strategy for multi-hop cellular networks. In: Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), pp. 193–198 (2004)Google Scholar
  20. 20.
    Weyland, A.: Cooperation and Accounting in Multi-Hop Cellular Networks. PhD thesis, Univ. of Bern (2005)Google Scholar
  21. 21.
    Zhang, Y., Lou, W., Fang, Y.: A secure incentive protocol for mobile ad hoc networks. ACM Wirel. Netw. 13(5), 569–582 (2007)CrossRefGoogle Scholar
  22. 22.
    Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, credit based system for mobile ad-hoc networks. Proc. IEEE INFOCOM 3, 1987–1997 (2003)Google Scholar
  23. 23.
    Salem, N., Buttyan, L., Hubaux, J., Jakobsson, M.: Node cooperation in hybrid ad hoc networks. IEEE Trans. Mob. Comput. 5(4), 365–376 (2006)CrossRefGoogle Scholar
  24. 24.
    Smys, S., Raj, J.S.: A self-organized structure for mobility management in wireless networks. Comput. Electr. Eng. 30(48), 153–63 (2015)CrossRefGoogle Scholar
  25. 25.
    Sultana, J., Ahmed, T.: Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: IEEE International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 539–543 (2017)Google Scholar
  26. 26.
    Smail, O., Cousin, B., Snoussaoui, I.: Energy-aware and stable cluster-based multipath routing protocol for wireless ad hoc networks. Int. J. Netw. Virtual Organ. 17(2–3), 229–251 (2017)CrossRefGoogle Scholar
  27. 27.
    Jyothirmai, Pondi, Raj, Jennifer S., Smys, S.: Secured self organizing network architecture in wireless personal networks. Wirel. Pers. Commun. 96(4), 5603–5620 (2017)CrossRefGoogle Scholar
  28. 28.
    National Inst. of Standards and Technology (NIST), “Recommendation for Key Management—Part 1: General (Revised),” Special Publication 800-57 200 (2007)Google Scholar
  29. 29.
    Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks, pp. 153–181. Springer, New York (1996)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.CSE DepartmentKLN College of EngineeringSivagangaiIndia
  2. 2.ECE DepartmentThiagarajar College of EngineeringMaduraiIndia

Personalised recommendations