Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes

被引:0
|
作者
Kargar, Mehdi [1 ]
Ghodsi, Mohammad [1 ,2 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to launch by malicious nodes in ad hoc networks. These nodes falsify data and routes in the network. Thus, mitigating this attack is vital for the performance of the whole network. Previous routing protocols in ad hoc networks inspired by game theory just consider that network consists of selfish nodes. In this work, we consider that the network consists of malicious nodes too. Here we present a truthful and secure mechanism for routing in ad hoc networks that cope malicious and selfish nodes.
引用
收藏
页码:117 / 128
页数:12
相关论文
共 50 条
  • [31] Using reputations in ad hoc networks to counter malicious nodes
    Dewan, P
    Dasgupta, P
    Bhattacharya, A
    TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 665 - 672
  • [32] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [33] A Truthful and Low-Overhead Routing Protocol for Ad Hoc Networks
    Wang, Dongbin
    Wang, Xiaofeng
    Yu, Xiangzhan
    Qi, Kaicheng
    Xia, Zhibin
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (02): : 127 - 138
  • [34] A Probabilistic Energy-Efficient Approach for Monitoring and Detecting Malicious/Selfish Nodes in Mobile Ad-hoc Networks
    Lupia, Andrea
    De Rango, Floriano
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [35] A Service Negotiation Model for Selfish nodes in the Mobile Ad hoc networks
    Yang, Yang
    Guo, Shao-yong
    Qiu, Xue-song
    Meng, Luo-ming
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [36] New approach for selfish nodes detection in mobile ad hoc networks
    Djenouri, Djamel
    Badache, Nadjib
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 288 - 294
  • [37] A gradual solution to detect selfish nodes in mobile ad hoc networks
    Djenouri D.
    Badache N.
    International Journal of Wireless and Mobile Computing, 2010, 4 (04) : 264 - 274
  • [38] Random feedbacks for selfish nodes detection in mobile ad hoc networks
    Djenouri, D
    Ouali, N
    Mahmoudi, A
    Badache, N
    OPERATIONS AND MANAGEMENT IN IP-BASED NETWORKS, PROCEEDINGS, 2005, 3751 : 68 - 75
  • [39] One method for selfish nodes security problem in ad hoc networks
    Wu, Hao
    Zheng, Zhi-Bin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (SUPPL.): : 2317 - 2321
  • [40] Impact of selfish nodes on route discovery in mobile ad hoc networks
    Zhang, Q
    Agrawal, DP
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2914 - 2918