Skip to main content
Log in

Triple referee incentive mechanism for secure mobile adhoc networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In MANETs, the mobile nodes usually relay other nodes’ packets for the proper operation of the network. However, selfish nodes usually don’t cooperate in relaying other nodes’ packets but use the regular nodes to relay their packets. The increase in the number of selfish nodes affects the network performance badly. Existing protocols try to minimize the impact of selfish nodes with high computation overhead and/or communication overhead. In this paper, triple referee incentive mechanism is proposed that employs three referees to monitor the behavior of any intermediate node. In case of any selfish behavior, the packets will be bypassed through the referee nodes so that the data communication is uninterrupted in the network. In addition, the selfish nodes are motivated through incentives with less packet overhead. Hash operations are used in the data packets and acknowledgement packets instead of the public key cryptography operations so that the average packet overhead is less than that of the public key cryptography based incentive protocols. Hash values are used to attain payment non repudiation and restrain free riding attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Li, X., Seet, B., Chong, P.: Multihop cellular networks: technology and economics. Comput. Netw. 52(9), 1825–1837 (2008)

    Article  MATH  Google Scholar 

  2. Shen, G., Liu, J., Wang, D., Wang, J., Jin, S.: Multi-hop relay for next-generation wireless access networks. Bell Labs Tech. J. 13(4), 175–193 (2009)

    Article  Google Scholar 

  3. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th Annual International Conference on Mobile Computing, pp. 255–265 (2000)

  4. Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: European Wireless Conference (2002)

  5. Jaramillo, J., Srikant, R.: DARWIN: distributed and adaptive reputation mechanism for wireless networks. In: Proceedings of 13th Annual ACM International Conference on Mobile Computing, pp. 87–98 (2007)

  6. Jiang, N., Hua, K., Liu, D.: A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks. J. Commun. Netw. 9(1), 56–66 (2007)

    Article  Google Scholar 

  7. Buttyan, L., Hubaux, J.: Nuglets: A virtual currency to stimulate cooperation in self organized ad hoc networks. Technical Report DSC/2001/001. Swiss Federal Inst Of Technology (2001)

  8. Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, creditbased system for mobile ad-hoc networks. Proc. IEEE INFOCOM 3, 1987–1997 (2003)

    Google Scholar 

  9. Mahmoud, M., Shen, X.: DSC: cooperation incentive mechanism for multi-hop cellular networks. Proc. IEEE Int’l Conf. Comm. (ICC ’09), pp. 569–574 (2009)

  10. Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wireless Comm. 8(4), 1974–1983 (2009)

    Article  Google Scholar 

  11. Hu, J.: Cooperation in Mobile Ad Hoc Networks. Technical Report TR-050111, Computer Science Dept., Florida State Univ. (2005)

  12. Marias, G., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mobile Comput. 6(3), 319–332 (2006)

    Article  Google Scholar 

  13. Jaramillo, J., Srikant, R.: DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks. In: Proc. ACM Mobile Computing, pp. 87–98 (2007)

  14. He, Q., Wu, D., Khosla, P.: A secure incentive architecture for ad-hoc networks. Wirel. Commun. Mobile Comput. 6(3), 333–346 (2006)

    Article  Google Scholar 

  15. Jiang, N., Hua, K., Liu, D.: A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks. Commun. Networks 9(1), 56–66 (2007)

    Article  Google Scholar 

  16. Xie, L., Zhu, S.: Message dropping attacks in overlay networks: attack detection and attacker identification. ACM Trans. Inf. Syst. Secur. 11(3), 1–10 (2008)

    Article  Google Scholar 

  17. Buttyan, L., Hubaux, J.: Nuglets: A Virtual Currency to Stimulate Cooperation in Self Organized Ad Hoc Networks. Technical Report DSC/2001/001, Swiss Federal Inst. of Technology (2001)

  18. Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2004)

    Article  Google Scholar 

  19. Weyland, A., Braun, T.: Cooperation and accounting strategy for multi-hop cellular networks. In: Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), pp. 193–198 (2004)

  20. Weyland, A.: Cooperation and Accounting in Multi-Hop Cellular Networks. PhD thesis, Univ. of Bern (2005)

  21. Zhang, Y., Lou, W., Fang, Y.: A secure incentive protocol for mobile ad hoc networks. ACM Wirel. Netw. 13(5), 569–582 (2007)

    Article  Google Scholar 

  22. Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, credit based system for mobile ad-hoc networks. Proc. IEEE INFOCOM 3, 1987–1997 (2003)

    Google Scholar 

  23. Salem, N., Buttyan, L., Hubaux, J., Jakobsson, M.: Node cooperation in hybrid ad hoc networks. IEEE Trans. Mob. Comput. 5(4), 365–376 (2006)

    Article  Google Scholar 

  24. Smys, S., Raj, J.S.: A self-organized structure for mobility management in wireless networks. Comput. Electr. Eng. 30(48), 153–63 (2015)

    Article  Google Scholar 

  25. Sultana, J., Ahmed, T.: Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: IEEE International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 539–543 (2017)

  26. Smail, O., Cousin, B., Snoussaoui, I.: Energy-aware and stable cluster-based multipath routing protocol for wireless ad hoc networks. Int. J. Netw. Virtual Organ. 17(2–3), 229–251 (2017)

    Article  Google Scholar 

  27. Jyothirmai, Pondi, Raj, Jennifer S., Smys, S.: Secured self organizing network architecture in wireless personal networks. Wirel. Pers. Commun. 96(4), 5603–5620 (2017)

    Article  Google Scholar 

  28. National Inst. of Standards and Technology (NIST), “Recommendation for Key Management—Part 1: General (Revised),” Special Publication 800-57 200 (2007)

  29. Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks, pp. 153–181. Springer, New York (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. R. Vedhavathy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vedhavathy, T.R., Manikandan, M.S.K. Triple referee incentive mechanism for secure mobile adhoc networks. Cluster Comput 22 (Suppl 1), 255–264 (2019). https://doi.org/10.1007/s10586-017-1631-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1631-8

Keywords

Navigation