Truthful and Secure Routing in Ad Hoc Networks

被引:1
|
作者
Kargar, Mehdi [1 ]
Ghodsi, Mohammad [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
关键词
D O I
10.1109/CSA.2008.42
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cooperation among nodes is vital in wireless networks since in such networks nodes depend on each other for routing packets. However, cooperation in such operations consumes nodes recourses such as battery and bandwidth. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes. We study routing in wireless networks from a game theoretic view point. Based on this view, the network consists of greedy and selfish nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to launch by malicious nodes in wireless networks. These nodes falsify data and routes in the network. Thus, mitigating this attack is vital for the performance of the whole network. Previous routing protocols in wireless networks inspired by game theory just consider that network consists of selfish nodes. In this work, we consider that the network consists of malicious nodes too. Here we present a secure and truthful mechanism for routing in wireless networks that cope selfish and malicious nodes.
引用
收藏
页码:369 / 376
页数:8
相关论文
共 50 条
  • [1] Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes
    Kargar, Mehdi
    Ghodsi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 117 - 128
  • [2] Truthful multipath routing for ad hoc networks with selfish nodes
    Wang, Yongwei
    Giruka, Venkata C.
    Singhal, Mukesh
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (06) : 778 - 789
  • [3] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [4] Secure distributed routing in ad hoc networks
    Mir, RN
    Wani, AM
    [J]. IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1091 - 1095
  • [5] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [6] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [7] Trusted Secure Routing for Ad Hoc Networks
    Haghpanah, Nima
    Akhoondi, Masould
    Kargar, Mehdi
    Movaghar, Ali
    [J]. MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2007, : 176 - 179
  • [8] A Truthful and Low-Overhead Routing Protocol for Ad Hoc Networks
    Wang, Dongbin
    Wang, Xiaofeng
    Yu, Xiangzhan
    Qi, Kaicheng
    Xia, Zhibin
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (02): : 127 - 138
  • [9] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [10] Castor: Scalable Secure Routing for Ad Hoc Networks
    Galuba, Wojciech
    Papadimitratos, Panos
    Poturalski, Marcin
    Aberer, Karl
    Despotovic, Zoran
    Kellerer, Wolfgang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,