Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes

被引:0
|
作者
Kargar, Mehdi [1 ]
Ghodsi, Mohammad [1 ,2 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to launch by malicious nodes in ad hoc networks. These nodes falsify data and routes in the network. Thus, mitigating this attack is vital for the performance of the whole network. Previous routing protocols in ad hoc networks inspired by game theory just consider that network consists of selfish nodes. In this work, we consider that the network consists of malicious nodes too. Here we present a truthful and secure mechanism for routing in ad hoc networks that cope malicious and selfish nodes.
引用
收藏
页码:117 / 128
页数:12
相关论文
共 50 条
  • [1] Truthful multipath routing for ad hoc networks with selfish nodes
    Wang, Yongwei
    Giruka, Venkata C.
    Singhal, Mukesh
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (06) : 778 - 789
  • [2] Truthful and Secure Routing in Ad Hoc Networks
    Kargar, Mehdi
    Ghodsi, Mohammad
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 369 - 376
  • [3] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
  • [4] The COMMIT protocol for truthful and cost-efficient routing in ad hoc networks with selfish nodes
    Eidenbenz, Stephan
    Resta, Giovanni
    Santi, Paolo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 19 - 33
  • [5] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [6] Truthful topology control in Wireless Ad Hoc Networks with selfish nodes
    Cai, Jianfeng
    Liu, Yunhuai
    Lian, Jie
    Li, Mo
    Pooch, Udo
    Ni, Lionel
    2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2006, : 203 - 210
  • [7] A Way to Solve the Threat of Selfish and Malicious Nodes for Ad hoc Networks
    Wang, Xingfu
    Dai, Fuquan
    Qian, Lei
    Dong, Hao
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 368 - 370
  • [8] A Low Overhead Truthful Energy-Efficient Routing Protocol in Wireless Mobile Ad hoc Networks with Selfish Nodes
    Yuan, Xinhui
    Chen, Songqiao
    Jiang, Xinhua
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 552 - 557
  • [9] A New Routing Protocol in Mobile Ad Hoc Networks with Selfish Nodes
    Saremi, Fatemeh
    Mousavi, Hamid
    Movaghar, Ali
    2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 114 - 118
  • [10] Novel Routing Protocol for Mobile Ad hoc Networks with Selfish and Altruistic Nodes
    Kampitaki, Dimitra G.
    Economides, Anastasios A.
    2016 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2016, : 170 - 174