Abstract
In MANETs, the mobile nodes usually relay other nodes’ packets for the proper operation of the network. However, selfish nodes usually don’t cooperate in relaying other nodes’ packets but use the regular nodes to relay their packets. The increase in the number of selfish nodes affects the network performance badly. Existing protocols try to minimize the impact of selfish nodes with high computation overhead and/or communication overhead. In this paper, triple referee incentive mechanism is proposed that employs three referees to monitor the behavior of any intermediate node. In case of any selfish behavior, the packets will be bypassed through the referee nodes so that the data communication is uninterrupted in the network. In addition, the selfish nodes are motivated through incentives with less packet overhead. Hash operations are used in the data packets and acknowledgement packets instead of the public key cryptography operations so that the average packet overhead is less than that of the public key cryptography based incentive protocols. Hash values are used to attain payment non repudiation and restrain free riding attacks.
Similar content being viewed by others
References
Li, X., Seet, B., Chong, P.: Multihop cellular networks: technology and economics. Comput. Netw. 52(9), 1825–1837 (2008)
Shen, G., Liu, J., Wang, D., Wang, J., Jin, S.: Multi-hop relay for next-generation wireless access networks. Bell Labs Tech. J. 13(4), 175–193 (2009)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th Annual International Conference on Mobile Computing, pp. 255–265 (2000)
Michiardi, P., Molva, R.: Simulation-based analysis of security exposures in mobile ad hoc networks. In: European Wireless Conference (2002)
Jaramillo, J., Srikant, R.: DARWIN: distributed and adaptive reputation mechanism for wireless networks. In: Proceedings of 13th Annual ACM International Conference on Mobile Computing, pp. 87–98 (2007)
Jiang, N., Hua, K., Liu, D.: A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks. J. Commun. Netw. 9(1), 56–66 (2007)
Buttyan, L., Hubaux, J.: Nuglets: A virtual currency to stimulate cooperation in self organized ad hoc networks. Technical Report DSC/2001/001. Swiss Federal Inst Of Technology (2001)
Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, creditbased system for mobile ad-hoc networks. Proc. IEEE INFOCOM 3, 1987–1997 (2003)
Mahmoud, M., Shen, X.: DSC: cooperation incentive mechanism for multi-hop cellular networks. Proc. IEEE Int’l Conf. Comm. (ICC ’09), pp. 569–574 (2009)
Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wireless Comm. 8(4), 1974–1983 (2009)
Hu, J.: Cooperation in Mobile Ad Hoc Networks. Technical Report TR-050111, Computer Science Dept., Florida State Univ. (2005)
Marias, G., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Wirel. Commun. Mobile Comput. 6(3), 319–332 (2006)
Jaramillo, J., Srikant, R.: DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks. In: Proc. ACM Mobile Computing, pp. 87–98 (2007)
He, Q., Wu, D., Khosla, P.: A secure incentive architecture for ad-hoc networks. Wirel. Commun. Mobile Comput. 6(3), 333–346 (2006)
Jiang, N., Hua, K., Liu, D.: A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks. Commun. Networks 9(1), 56–66 (2007)
Xie, L., Zhu, S.: Message dropping attacks in overlay networks: attack detection and attacker identification. ACM Trans. Inf. Syst. Secur. 11(3), 1–10 (2008)
Buttyan, L., Hubaux, J.: Nuglets: A Virtual Currency to Stimulate Cooperation in Self Organized Ad Hoc Networks. Technical Report DSC/2001/001, Swiss Federal Inst. of Technology (2001)
Buttyan, L., Hubaux, J.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8(5), 579–592 (2004)
Weyland, A., Braun, T.: Cooperation and accounting strategy for multi-hop cellular networks. In: Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), pp. 193–198 (2004)
Weyland, A.: Cooperation and Accounting in Multi-Hop Cellular Networks. PhD thesis, Univ. of Bern (2005)
Zhang, Y., Lou, W., Fang, Y.: A secure incentive protocol for mobile ad hoc networks. ACM Wirel. Netw. 13(5), 569–582 (2007)
Zhong, S., Chen, J., Yang, R.: Sprite: a simple, cheat-proof, credit based system for mobile ad-hoc networks. Proc. IEEE INFOCOM 3, 1987–1997 (2003)
Salem, N., Buttyan, L., Hubaux, J., Jakobsson, M.: Node cooperation in hybrid ad hoc networks. IEEE Trans. Mob. Comput. 5(4), 365–376 (2006)
Smys, S., Raj, J.S.: A self-organized structure for mobility management in wireless networks. Comput. Electr. Eng. 30(48), 153–63 (2015)
Sultana, J., Ahmed, T.: Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: IEEE International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 539–543 (2017)
Smail, O., Cousin, B., Snoussaoui, I.: Energy-aware and stable cluster-based multipath routing protocol for wireless ad hoc networks. Int. J. Netw. Virtual Organ. 17(2–3), 229–251 (2017)
Jyothirmai, Pondi, Raj, Jennifer S., Smys, S.: Secured self organizing network architecture in wireless personal networks. Wirel. Pers. Commun. 96(4), 5603–5620 (2017)
National Inst. of Standards and Technology (NIST), “Recommendation for Key Management—Part 1: General (Revised),” Special Publication 800-57 200 (2007)
Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks, pp. 153–181. Springer, New York (1996)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vedhavathy, T.R., Manikandan, M.S.K. Triple referee incentive mechanism for secure mobile adhoc networks. Cluster Comput 22 (Suppl 1), 255–264 (2019). https://doi.org/10.1007/s10586-017-1631-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1631-8