Skip to main content
Log in

OMH—Suppressing Selfish Behavior in Ad hoc Networks with One More Hop

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In ad hoc networks, wireless nodes rely on each other to transmit data over multi-hops by forwarding packets. A selfish node may decide not to forward packets for other nodes to save its own resource but still use the network to send and receive data. Such a selfish behavior can degrade network performance significantly. Most existing work took observation, reputation and token based mechanisms. However observation based mechanism suffers from mobility and collusion; reputation and token based mechanisms suffer from system complexity and efficiency. In this paper, we propose One More Hop (OMH) protocol which suppresses selfish behavior from a totally new angle. Basing on the fact that the selfish but rational nodes still want to receive and send packets, if a node can not determine whether a packet is destined for it or not, it can not drop the packet. With modified routing protocol and cryptographic techniques, OMH achieves this design target. It is robust and efficient. The simulation shows that OMH works well under different network situations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Aad I, Hubaux J-P, Knightly EW (2004) Denial of service resilience in ad hoc networks. In: MobiCom ’04: proceedings of the 10th annual international conference on mobile computing and networking, pp 202–215

  2. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom ’00: proceedings of the 6th annual international conference on mobile computing and networking, pp 255–265

  3. Hu J, Burmester M (2006) Lars: a locally aware reputation system for mobile ad hoc networks. In: ACM-SE 44: proceedings of the 44th annual Southeast regional conference, pp 119–123

  4. Buchegger S, Le Boudee J-Y (2005) Self-policing mobile ad hoc networks by reputation systems. Commun Mag IEEE 43(7):101–107

    Article  Google Scholar 

  5. Buttyan L, Hubaux J-P (2001) Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Swiss Federal Institute of Technology, Tech. Rep.

  6. Jakobsson M, Hubaux J, Buttyan L (2003) A micropayment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of Financial Crypto 2003, Guadeloupe, 27–30 January 2003, pp 15–33

  7. Djenouri D, Badache N (2005) New approach for selfish nodes detection in mobile ad hoc networks. Security and privacy for emerging areas in communication networks, 2005. Workshop of the 1st international conference on, 5–9 September 2005, pp 288–294

  8. Yu B, Xiao B (2006) Detecting selective forwarding attacks in wireless sensor networks. Parallel and distributed processing symposium, 2006. IPDPS 2006. 20th international, 25–29 April 2006, 8 pp

  9. Buchegger S, Boudec J-YL (2002) Performance analysis of the confidant protocol. In: MobiHoc ’02: proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing, pp 226–236

  10. Jaramillo JJ, Srikant R (2007) Darwin: distributed and adaptive reputation mechanism for wireless ad-hoc networks. In: MobiCom ’07: proceedings of the 13th annual ACM international conference on mobile computing and networking, pp 87–98

  11. Tewari H, O’Mahony D (2003) Multiparty micropayments for ad hoc networks. In: Wireless communications and networking, 2003 (WCNC, 2003), vol 3. IEEE, 16–20 March, pp 2033–2040

  12. Zhong S, Li LE, Liu YG, Yang YR (2005) On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. In: MobiCom ’05: Proceedings of the 11th annual international conference on mobile computing and networking, pp 117–131

  13. Huang E, Crowcroft J, Wassell I (2004) Rethinking incentives for mobile ad hoc networks. In: PINS ’04: proceedings of the ACM SIGCOMM workshop on practice and theory of incentives in networked systems, pp 191–196

  14. Johnson D, Maltz D, Broch J (2001) DSR the dynamic source routing protocol for multihop wireless ad hoc networks. Addison-Wesley, Reading, ch. 5, pp 139–172

  15. Zhong S, Wu F (2007) On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In: MobiCom ’07: proceedings of the 13th annual ACM international conference on mobile computing and networking, pp 278–289

  16. Wei D (2007) Crypto++ 5.5 benchmarks. http://www.cryptopp.com/bench-marks.html

  17. Schnorr CP (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174

    Article  MATH  MathSciNet  Google Scholar 

  18. Zhou L, Haas Z (1999) Securing ad hoc networks. Network IEEE 13(6):24–30

    Article  Google Scholar 

  19. Hubaux J-P, Buttyán L, Capkun S (2001) The quest for security in mobile ad hoc networks. In: MobiHoc ’01: proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing, pp 146–155

  20. Jiejun K, Petros Z, Luo H, Lu S, Zhang L (2001) Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Network Protocols, 2001. Ninth international conference on, 11–14 November, pp 251–260

  21. Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chengqi Song.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Song, C., Zhang, Q. OMH—Suppressing Selfish Behavior in Ad hoc Networks with One More Hop. Mobile Netw Appl 14, 178–187 (2009). https://doi.org/10.1007/s11036-008-0145-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-008-0145-2

Keywords

Navigation