Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes

被引:0
|
作者
Kargar, Mehdi [1 ]
Ghodsi, Mohammad [1 ,2 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to launch by malicious nodes in ad hoc networks. These nodes falsify data and routes in the network. Thus, mitigating this attack is vital for the performance of the whole network. Previous routing protocols in ad hoc networks inspired by game theory just consider that network consists of selfish nodes. In this work, we consider that the network consists of malicious nodes too. Here we present a truthful and secure mechanism for routing in ad hoc networks that cope malicious and selfish nodes.
引用
收藏
页码:117 / 128
页数:12
相关论文
共 50 条
  • [21] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [22] On improving the efficiency of truthful routing in MANETs with selfish nodes
    Wang, Yongwei
    Singhal, Mukesh
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (05) : 537 - 559
  • [23] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [24] Trusted Secure Routing for Ad Hoc Networks
    Haghpanah, Nima
    Akhoondi, Masould
    Kargar, Mehdi
    Movaghar, Ali
    MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2007, : 176 - 179
  • [25] A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes
    Crepeau, Claude
    Davis, Carlton R.
    Maheswaran, Muthucumaru
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 19 - +
  • [26] CSR: Constrained Selfish Routing in Ad-Hoc Networks
    Bassem, Christine
    Bestavros, Azer
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 179 - 189
  • [27] Local detection of selfish routing behavior in ad hoc networks
    Wang, B
    Soltani, S
    Shapiro, JK
    Tan, PN
    8TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2005, : 392 - 399
  • [28] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [29] Crosscheck mechanism to identify malicious nodes in ad hoc networks
    Su, Xu
    Boppana, Rajendra V.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 45 - 54
  • [30] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531