Open Access Open Access  Restricted Access Subscription or Fee Access

Public Key Based Incentive Strategies for Cooperation in MANETs

R. Vidhyalakshmi, P. Srinivasaragavan

Abstract


Cooperation incentive schemes can motivate the Selfish nodes to reach other nodes packets to enhance the performance of multi-hop wireless networks. Secure schemes typically use public key cryptography to traverse various attacks such as payment repudiation and free equitation. However, these cryptosystems undergo too heavy overhead to be used efficiently in the limited-resource nodes. Here, propose a secure cooperation incentive scheme that requires public-key operations only for the first packet in a sequence, and then the efficient hashing operations are used in the following packets, so that the aerial of the packet string converges to that of the hashing operations. Our evaluations express that our scheme is secure and has much less overhead than the signature-based incentive schemes because the efficient hashing operations dominate the nodes operations. Security analysis and performance appraisal demonstrate that the proposed protocol is secure and the overground is incomparable to the publickey based incentive protocols because the efficient hashing operations dominate the nodes operations. Moreover, the average packet overground is less than that of the public-key based protocols with very high prospect due to truncating the keyed hash values.

Keywords


MANET, Network Topology, Public Key Cryptography, Hash Key

Full Text:

PDF

References


Ze Li, ―Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks‖- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 8, August 2012

Q. He, D. Wu, and P. Khosla, ―SORI: A Secure and Objective Reputation-Based Incentive Scheme for Ad-Hoc Networks,‖ Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2004.

V. Srinivasan, ―Cooperation in Wireless Ad Hoc Networks,‖ Proc.IEEE INFOCOM, 2003.

V. Srivastava, J. Neel, A.B. Mackenzie, R. Menon, L.A. Dasilva, J.E.Hicks, J.H. Reed, and R.P. Gilles, ―Using Game Theory to AnalyzeWireless Ad Hoc Networks,‖ IEEE Comm. Surveys and Tutorials, vol.7, no. 4,pp. 46-56, Fourth Quarter 2005.

Z. Li and H. Shen, ―Analysis of a Hybrid Reputation Management System for Mobile Ad Hoc Networks,‖ Proc. 18th Int’l Conf.Computer Comm. and Networks (ICCCN), 2009.

Aram, C. Singh, S. Sarkar, and A. Kumar,Cooperative Profit Sharing in Coalition Based Resource Allocation in Wireless Networks,‖ Proc.IEEE INFOCOM, 2009.

H. Shen and Z. Li, ―ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks,”Proc. Int’l Workshop Wireless Security and Privacy (WISP), 2008.

M.T. Refaei, L.A. DaSilva, M. Eltoweissy, and T. Nadeem,“Adaptation of Reputation Management Systems to DynamicNetwork Conditions in Ad Hoc Networks,” IEEE Trans. Computers, vol. 59, no. 5, pp. 707-719, May 2000

P.D. Straffin, Game Theory and Strategy. The Math. Assoc. of Am.,1993.

J. Cai and U. Pooch, “Allocate Fair Payoff for Cooperation in Wireless Ad Hoc Networks Using Shapley Value,” Proc. Int’l Parallel and Distributed Processing Symp.(IPDPS),2004.

L.B. Koralov and Y.G. Sinai, Theory of Probability and Random Processes. Springer, 2007.

B. Zong, F. Xu, J. Jiao, and J. Lv, “A Broker-Assisting Trust and Reputation System Based on Artificial Neural Network,” Proc.IEEE Int’l Conf. Systems, Man, and Cybernetics (SMC), 2009.

P. Dewan, P. Dasgupta, and A. Bhattacharys, “On Using Reputations in Ad Hoc Networks to Counter Malicious Nodes,”Proc. Int’l Conf. Parallel and Distributed Systems (ICPADS), 2004.

J.J. Jaramillo and R. Srikant, “DARWIN: Distributed and AdaptiveReputation Mechanism for Wireless Networks,” Proc. ACM MobiCom, 2007.

K. Balakrishnan, J. Deng, and V.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Netwotks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2005


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.