Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes

被引:0
|
作者
Kargar, Mehdi [1 ]
Ghodsi, Mohammad [1 ,2 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to launch by malicious nodes in ad hoc networks. These nodes falsify data and routes in the network. Thus, mitigating this attack is vital for the performance of the whole network. Previous routing protocols in ad hoc networks inspired by game theory just consider that network consists of selfish nodes. In this work, we consider that the network consists of malicious nodes too. Here we present a truthful and secure mechanism for routing in ad hoc networks that cope malicious and selfish nodes.
引用
收藏
页码:117 / 128
页数:12
相关论文
共 50 条
  • [41] Quantifying Nodes Trustworthiness Using Hybrid Approach for Secure Routing in Mobile Ad Hoc Networks
    Reddy, M. Venkata Krishna
    Srinivas, P. V. S.
    Mohan, M. Chandra
    ADVANCES IN COMPUTING AND DATA SCIENCES (ICACDS 2022), PT I, 2022, 1613 : 348 - 360
  • [42] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [43] Castor: Scalable Secure Routing for Ad Hoc Networks
    Galuba, Wojciech
    Papadimitratos, Panos
    Poturalski, Marcin
    Aberer, Karl
    Despotovic, Zoran
    Kellerer, Wolfgang
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [44] A secure routing mechanism in AODV for ad hoc networks
    Liu Jinghua
    Peng, Geng
    Qiu Yingqiang
    Gui, Feng
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 446 - +
  • [45] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [46] Secure routing and intrusion detection in ad hoc networks
    Patwardhan, A
    Parker, J
    Joshi, A
    Iorga, M
    Karygiannis, T
    THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 191 - 199
  • [47] Secure Opportunistic Routing for Vehicular Ad Hoc Networks
    Das, Debasis
    Vasudev, Harsha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 210 - 217
  • [48] Secure multipath routing for mobile ad hoc networks
    Kotzanikolaou, P
    Mavropodi, R
    Douligeris, C
    SECOND ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, PROCEEDINGS, 2005, : 89 - 96
  • [49] GLS with secure routing in ad-hoc networks
    Sumathy, V
    Narayanasmy, P
    Baskaran, K
    Purusothaman, T
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1072 - 1076
  • [50] Advanced Secure Routing in Ad hoc mobile networks
    Padmadas, M.
    Krishnan, N.
    Sasidharan, Sithara
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 821 - 824