A secure routing protocol with node selfishness resistance in MANETs

In Mobile Ad hoc Networks (MANETs), available nodes must act as their own router and also rely on other nodes to relay communication packets. However, some intermediate nodes may refuse to forward packets to other nodes or discard route-discovery requests from others to save power, as much as those consumed during the message transmission phase. In order to prevent node sel?shness, we have proposed a novel approach to message security using a payment-based mechanism in MANETs. In this way, the proposed routing protocol with payment mechanism not only avoids the sel?sh nodes that may refuse to route packets, but also restrains the nodes from sending useless packets into the networks. Finally, the proposed payment mechanism ensures ad hoc communications in a sel?ess environment by providing economic encouragement to enforce node cooperation in MANETs.

[1]  Xiaohua Jia,et al.  QoS multicast routing by using multiple paths/trees in wireless ad hoc networks , 2007, Ad Hoc Networks.

[2]  Yen-Ping Chu,et al.  An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .

[3]  Xiaojiang Du,et al.  QoS routing based on multi-class nodes for mobile ad hoc networks , 2004, Ad Hoc Networks.

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[6]  Jian Wang,et al.  DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , 2006, Comput. Stand. Interfaces.

[7]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[8]  Martin B. H. Weiss,et al.  Analysis of mobile broadband competition: 3G vs. WiFi , 2010, Int. J. Mob. Commun..

[9]  Min-Shiang Hwang,et al.  An authentication protocol for low-cost RFID tags , 2011, Int. J. Mob. Commun..

[10]  Sudip Misra,et al.  Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..

[11]  Dong-Hee Shin,et al.  Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk , 2010, Int. J. Mob. Commun..

[12]  Jalel Ben-Othman,et al.  Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..

[13]  Hussein Al-Bahadili,et al.  Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs , 2011, Int. J. Netw. Secur..

[14]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[15]  Marcus Stögbauer Efficient Algorithms for Pairing-Based Cryptosystems , 2004 .

[16]  Hwangjun Song,et al.  Secure Route Discovery Protocol for Ad Hoc Networks , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[17]  Hsung-Pin Chang,et al.  A hybrid efficient routing protocol for sink-oriented ad hoc sensor networks , 2009, Int. J. Mob. Commun..

[18]  Olivier Festor,et al.  Group Key Management in MANETs , 2008, Int. J. Netw. Secur..

[19]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[20]  Chun-Ta Li,et al.  An electronic voting protocol with deniable authentication for mobile ad hoc networks , 2008, Comput. Commun..

[21]  Chansu Yu,et al.  Uncertainty-aware Wireless Sensor Networks , 2009, Int. J. Mob. Commun..

[22]  Yasser Kamal Hassan,et al.  Performance Evaluation of Mobility Speed over MANET Routing Protocols , 2010, Int. J. Netw. Secur..

[23]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[24]  Min-Shiang Hwang,et al.  User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications , 2011, Int. J. Mob. Commun..

[25]  Chun-Ta Li,et al.  Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks , 2008, Comput. Syst. Sci. Eng..

[26]  Chun-Ta Li,et al.  Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks , 2009, Int. J. Netw. Secur..

[27]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[28]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[29]  Ajay D. Kshemkalyani,et al.  Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks , 2007, Int. J. Netw. Secur..

[30]  Lei Guo,et al.  Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.

[31]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..