Skip to main content

ISPM: An Improved Secure Payment Mechanism to Prevent the Black Hole Attack and Selfish Node in WMN

  • Chapter
  • First Online:
Future Information Communication Technology and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 235))

  • 192 Accesses

Abstract

The existing receipt-based mechanisms only concerned with selfish nodes, but it lack of concern for the internal attacks and fail to prevent unsafe routing to establish. In this paper, an improved secure payment mechanism (ISPM) is proposed to prevent the black hole attack and selfish node in WMN. ISPM can effectively reduce the nodes selfish behavior with the timer that contained in each mesh node. In addition, the mesh nodes saved receipt is also used to against black hole attacks. Instead of requesting all mesh nodes in the forwarding path submitted the receipt to the accounting center (AC), only one mesh node need to submit the receipt to AC in ISPM. Our analytical and simulation results demonstrate that ISPM has lower packet loss rate and higher throughput than the traditional receipt-base payment mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz IF, Wang XD, Wang WL (2005) Wireless mesh networks: a survey. Comput Netw J 47:445–487

    Article  MATH  Google Scholar 

  2. Chen HS, Ji ZZ, Hu MZ (2006) A novel security agent scheme for AODV routing protocol based on thread state transition. Asian J Inf Technol 5:54–60

    Google Scholar 

  3. Tseng FH, Chou LD, Chao HC (2011) A survey of blackhole attacks in wireless mobile ad hoc networks. Human-centric Comput Inf Sci 1:4

    Article  Google Scholar 

  4. Prathapani A, Santhanam LP, Agrawal D (2011) Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents. J Supercomputing, pp 1–28

    Google Scholar 

  5. Gupta S, Kar S, Dharmaraja S (2011) BAAP: blackhole attack avoidance protocol for wireless network. In: 2nd IEEE international conference on computer and communication technology (ICCCT). IEEE press, Allahabad, pp 468–473

    Google Scholar 

  6. Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. J Netw 3:13–20

    Google Scholar 

  7. Buchegger S, Boudec JL (2002) Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad-hoc networks). In: 3rd ACM international symposium on mobile ad hoc networking and computing. ACM Press, Lausanne, pp 226–236

    Google Scholar 

  8. Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: 6th IFIP communications and multimedia security conference (CMS), Portorosz

    Google Scholar 

  9. Buttyan L, Hubaux JP (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Netw Appl 8:579–592

    Article  Google Scholar 

  10. Salem NB, Buttyan L, Hubaux JP, Jakobsson M (2003) A charging and rewarding scheme for packet forwarding in multihop cellular networks. In: 4th ACM international symposium on mobile ad hoc networking and computing. ACM Press, Annapolis, pp 13–24

    Google Scholar 

  11. Janzadeh H, Fayazbakhsh K, Dehghan M, Fallah MS (2009) A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Gener Comput Syst 25:926–934

    Article  Google Scholar 

  12. Mahmoud MMEA, Shen XM (2010) PIS: a practical incentive system for multihop wireless networks. IEEE Trans Veh Technol 59:4012–4025

    Article  Google Scholar 

  13. Mahmoud MMEA, Shen XM (2011) RISE: receipt-free cooperation incentive scheme for multihop wireless networks. In: IEEE international conference on communications (ICC). IEEE Press, Kyoto, pp 1–5

    Google Scholar 

  14. Mahmoud MMEA, Shen XM (2013) A secure payment scheme with low communication and processing overhead for multihop wireless networks. IEEE Trans Parallel Distrib Syst 24:209–224

    Article  Google Scholar 

Download references

Acknowledgments

This work has been partially supported by Scientific Research Fund of Hunan Provincial Education Department (No: 10B034), Hunan Provincial Natural Science Foundation of China (No: 10JJ3067), Hunan Provincial Science and Technology Plan Project (No: 2012FJ4333).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junguo Liao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Liao, J., Li, J. (2013). ISPM: An Improved Secure Payment Mechanism to Prevent the Black Hole Attack and Selfish Node in WMN. In: Jung, HK., Kim, J., Sahama, T., Yang, CH. (eds) Future Information Communication Technology and Applications. Lecture Notes in Electrical Engineering, vol 235. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6516-0_19

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6516-0_19

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6515-3

  • Online ISBN: 978-94-007-6516-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics