Skip to main content
Erschienen in: The Journal of Supercomputing 10/2018

26.05.2018

Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network

verfasst von: Mahdi Bounouni, Louiza Bouallouche-Medjkoune

Erschienen in: The Journal of Supercomputing | Ausgabe 10/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose an acknowledgment-based punishment and stimulation scheme, called APS. The purposes are to punish malicious nodes dropping data packets and to stimulate the cooperation of selfish nodes. APS approach is structured around four interactive modules. The monitoring module monitors the correct forwarding of routing and data packets. The reputation module assesses the reputation of neighbors. We have proposed a reputation exchange method that enables nodes to share their recommendations about other nodes only within their neighborhoods, and the combination is done based on CIF rules (Combined trust on Importance Factor). The stimulator module is responsible for updating and managing the nodes credit accounts. The price and the reward in term of credit are determined based on the cooperativeness state of a node. Finally, the isolator module punishes both malicious and selfish nodes. The simulation results show that APS scheme increases the throughput and minimizes the malicious dropping ratio, while improving the success ratio of cooperative nodes, and reducing the success ratio and the isolation time of selfish nodes as well.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kobayashi K, Totani Y, Utsu K, Ishii H (2016) Achieving secure communication over MANET using secret sharing schemes. J Supercomput 72:1215–1225CrossRef Kobayashi K, Totani Y, Utsu K, Ishii H (2016) Achieving secure communication over MANET using secret sharing schemes. J Supercomput 72:1215–1225CrossRef
2.
Zurück zum Zitat Ramrekha TA, Panaousis E, Politis C (2013) Standardisation advancements in the area of routing for mobile ad-hoc networks. J Supercomput 64:409–434CrossRef Ramrekha TA, Panaousis E, Politis C (2013) Standardisation advancements in the area of routing for mobile ad-hoc networks. J Supercomput 64:409–434CrossRef
3.
Zurück zum Zitat Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 255–265 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp 255–265
4.
Zurück zum Zitat Yau PW, Mitchell CJ (2003) Reputation methods for routing security for mobile ad hoc networks. In: Mobile future and symposium on trends in communications (SympoTIC’03), pp 130-137 Yau PW, Mitchell CJ (2003) Reputation methods for routing security for mobile ad hoc networks. In: Mobile future and symposium on trends in communications (SympoTIC’03), pp 130-137
5.
Zurück zum Zitat Prathapani A, Santhanam L, Agrawal DP (2013) Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents. J Supercomput 64:777–804CrossRef Prathapani A, Santhanam L, Agrawal DP (2013) Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents. J Supercomput 64:777–804CrossRef
6.
Zurück zum Zitat Balakrishnan K, Deng J, Varshney PK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. In: Wireless Communications and Networking Conference, pp 2137–2142 Balakrishnan K, Deng J, Varshney PK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. In: Wireless Communications and Networking Conference, pp 2137–2142
7.
Zurück zum Zitat Sheltami T, Al-Roubaiey A, Shakshuki E, Mahmoud A (2009) Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimed Syst 15:273–282CrossRef Sheltami T, Al-Roubaiey A, Shakshuki E, Mahmoud A (2009) Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimed Syst 15:273–282CrossRef
9.
Zurück zum Zitat Jesudoss A, Raja SK, Sulaiman A (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24:250–263CrossRef Jesudoss A, Raja SK, Sulaiman A (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24:250–263CrossRef
10.
Zurück zum Zitat Lei T, Wang S, Li J, You I, Yang F (2016) Detecting and preventing selfish behaviour in mobile ad hoc network. J Supercomput 72:3156–3168CrossRef Lei T, Wang S, Li J, You I, Yang F (2016) Detecting and preventing selfish behaviour in mobile ad hoc network. J Supercomput 72:3156–3168CrossRef
11.
Zurück zum Zitat Buttyn L, Hubaux JP (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592CrossRef Buttyn L, Hubaux JP (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mob Netw Appl 8:579–592CrossRef
12.
Zurück zum Zitat Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol 3, pp 1987–1997 Zhong S, Chen J, Yang YR (2003) Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol 3, pp 1987–1997
13.
Zurück zum Zitat Guo J, Liu H, Dong J, Yang X (2007) HEAD: a hybrid mechanism to enforce node cooperation in mobile ad hoc networks. Tsinghua Sci Technol 12:202–207CrossRef Guo J, Liu H, Dong J, Yang X (2007) HEAD: a hybrid mechanism to enforce node cooperation in mobile ad hoc networks. Tsinghua Sci Technol 12:202–207CrossRef
14.
Zurück zum Zitat Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58:4628–4639CrossRef Zhu H, Lin X, Lu R, Fan Y, Shen X (2009) Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58:4628–4639CrossRef
15.
Zurück zum Zitat Mahmoud MMEA, Shen X (2012) FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. IEEE Trans Mob Comput 11:753–766CrossRef Mahmoud MMEA, Shen X (2012) FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks. IEEE Trans Mob Comput 11:753–766CrossRef
16.
Zurück zum Zitat Abdel-Halim IT, Fahmy HMA, Bahaa-Eldin AM (2015) agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wirel Netw 21:467–483CrossRef Abdel-Halim IT, Fahmy HMA, Bahaa-Eldin AM (2015) agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wirel Netw 21:467–483CrossRef
17.
Zurück zum Zitat Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing, pp 153–181 Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing, pp 153–181
18.
Zurück zum Zitat Buchegger S, Le Boudec J. Y (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing, pp 226–236 Buchegger S, Le Boudec J. Y (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing, pp 226–236
19.
Zurück zum Zitat Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Advanced communications and multimedia security, pp 107–121CrossRef Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Advanced communications and multimedia security, pp 107–121CrossRef
20.
Zurück zum Zitat Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 6:536–550CrossRef Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 6:536–550CrossRef
21.
Zurück zum Zitat Shakshuki EM, Kang N, Sheltami TR (2013) EAACK-a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60:1089–1098CrossRef Shakshuki EM, Kang N, Sheltami TR (2013) EAACK-a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60:1089–1098CrossRef
22.
Zurück zum Zitat Huang L, Lei L, Lixiang L, Haibin Z, Tang L (2007) Stimulating cooperation in route discovery of ad hoc networks. In: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, pp 39–46 Huang L, Lei L, Lixiang L, Haibin Z, Tang L (2007) Stimulating cooperation in route discovery of ad hoc networks. In: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, pp 39–46
23.
Zurück zum Zitat Bounouni M, Bouallouche-Medjkoune L (2016) A hybrid stimulation approach for coping against the malevolence and selfishness in mobile ad hoc network. Wirel Pers Commun 882:255–281CrossRef Bounouni M, Bouallouche-Medjkoune L (2016) A hybrid stimulation approach for coping against the malevolence and selfishness in mobile ad hoc network. Wirel Pers Commun 882:255–281CrossRef
25.
Zurück zum Zitat Chen TM, Venkataramanan V (2005) Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput 9:35–41CrossRef Chen TM, Venkataramanan V (2005) Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput 9:35–41CrossRef
26.
Zurück zum Zitat Zhao Z, Hu H, Ahn GJ, Wu R (2012) Risk-aware mitigation for MANET routing attacks. IEEE Trans Dependable Secure Comput 9:250–260CrossRef Zhao Z, Hu H, Ahn GJ, Wu R (2012) Risk-aware mitigation for MANET routing attacks. IEEE Trans Dependable Secure Comput 9:250–260CrossRef
Metadaten
Titel
Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network
verfasst von
Mahdi Bounouni
Louiza Bouallouche-Medjkoune
Publikationsdatum
26.05.2018
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 10/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-018-2434-2

Weitere Artikel der Ausgabe 10/2018

The Journal of Supercomputing 10/2018 Zur Ausgabe