SlideShare a Scribd company logo
1 of 7
Download to read offline
RESEARCH PAPER
1
Volume 3, Issue 3,May-June 2013
Available Online at www.gpublication.com/jcer
ISSN No.: 2250-2637
©Genxcellence Publication 2011, All Rights Reserved
Secure and trustworthy incentives cooperation mechanism for multi-hop
wireless networks
R. Kirubaburi*1
, V.M. Priyadarshini2
*1
Pervasive Computing Technology, Bharathidasan Institute of Technology, Anna University :: Regional Center,
Tiruchirappalli, Tamil Nadu, India.
srikirubaburi@gmail.com1
2
Assistant Professor, Dept of CSE, Bharathidasan Institute of Technology, Anna University:: Regional Center,
Tiruchirappalli, Tamil Nadu, India.
vmpriyadarshini@ gmail.com 2
Abstract -
In Multi-Hop Wireless Networks (MWN), the mobile nodes usually relay their packets using cooperative nodes. But there are
several negative effect in cooperation of nodes and degrade the network performance due to selfish node behavior which will
also degrade the connectivity of node, throughput and power consumption. In this paper proposes a secure and trustworthy
incentives cooperation mechanism for multi-hop Wireless networks for secure cooperation among trusted nodes and to
thwart the selfishness attack, collision attack and Denial of service attacks. To prevent the selfishness node behavior we using
incentive mechanisms which will charge nodes efficiently. Hashing operation is used to provides the communication between
nodes more securely improves integrity and confidentiality. Token based cheque submission scheme is used to reduce the
collusion attacks. The nodes credits are updated and stored by Accounting Center (AC) efficiently which will classify the
cheques and verify the certificates from nodes during eviction process. Instead of submitting cheques by all the intermediate
node, Source node that will select any one intermediate node based on their credits and trusted node in network to reducing
the overhead of payment cheques. Trustworthy Checker components in AC, which will monitor all the node performance in
the network and remove the selfishness node from the networks. Trustworthy checker can precisely differentiate between the
honest nodes and irrational packet droppers. Extensive analysis and simulation demonstrate that our mechanism can
significantly reduce the cheques and allow secure trusted node for communications.
Keywords-
Incentives; Cheque; Trustworthy; Token; Accounting Center; Round Trip time (RTT); Hashing.
INTRODUCTION
1.1 Multi-hop wireless networks
In Multi-hop Wireless Networks, the
mobile nodes usually relay others packets for enhancing
the network performance and deployment. However,
the presence of the selfish nodes usually do not
cooperate but make use of the cooperative nodes to
relay their packets, which has a worst effect on the
network fairness and performance. The fundamental
idea of Multi-hop communication is to break an original
long communication link into two or more shorter links,
and it will reduce the required transmission power of
each node participating in the communication.
Apparently, the decreasing transmission power could
also lead to a lower interference level and shorter
frequency reuse distance. With small interference, more
users can be accepted in the system and the capacity is
increased.
Multi-hop Wireless Networks (MWNs) such as
mobile ad-hoc, vehicular ad-hoc, multi-hop cellular, and
wireless mesh networks have been emerging for
enabling new applications and enhancing the network
performance and deployment. In MWNs, the mobile
nodes usually act as routers to relay others’ traffic to the
destination. The network nodes usually commit with
bandwidth, data storage, CPU cycles, battery power, etc,
forming a pool of resources that can be shared by all of
them. The utility of the nodes can also obtain from the
pooled resources is much higher than that they can
obtain on their own. Multi-hop packet relay can extend
the communication range using limited transmit power
because packets are transmitted over shorter distances.
It also can improve the area of spectral efficiency and
the network throughput and capacity However, due to
the nature of wireless transmission and multi-hop
packet relay, MWNs are vulnerable to serious security
challenges that endanger their practical implementation.
1.2 Strategies for handling selfish behaviour in nodes
Wireless mobile node are usually constrained
by computation resources. The nodes which are not
willing to forward packet and share the memory
resources are called selfish nodes. Non cooperation
behavior nodes can significantly adversely affect the
entire networks. The selfish nodes do not satisfy
neighbor nodes by giving required data to them. In an
autonomous ad hoc network, each node is supply with
a battery of limited power supply and may act as a
service provider. To extend own life, a node may
exhibit selfish behavior by benefiting from resources
provided by other nodes, without, in return, making
available resources of their own devices. Based on node
behavior they divided into three they are,
Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7
2
1. non selfish nodes,
2. partially selfish nodes,
3. fully selfish nodes.
1.2.1 Reputation based technique
In reputation based technique each node
monitors the transmission of a neighbor node. Each
node in the networks runs the confidant protocol. If the
neighbor nodes does not relay the packet correctly it is
considered as a selfish nodes. Monitoring the nodes
transmissions by overhearing the channel is not energy-
efficient for transmitters. The extreme power
transmission is used instead of adapting the
transmission power according to the distance separating
the transmitter and the receiver to enable more
neighboring nodes to overhear the packet transmission.
In the reputation system maintains a list containing the
selfish nodes. When forwarding packets, nodes avoid
next nodes on the list. Finally it will drops the request
from selfish nodes. In reputation mechanism use the
more power consumption other than any method. Each
node will loss the energy frequently as they monitoring
the networks. There are two technique is used in the
reputation based technique they are
i. Watchdog Technique.
ii. Pathrater Technique.
i. Watchdog Technique
The Watchdog is one of the mechanisms which
detect selfish nodes by running a misbehaving node
locator on every host that maintains a buffer of recently
sent packets. If the count exceeds a threshold value, the
watchdog considers that host as a misbehaving
node[14].
ii. Pathrater Technique
A Pathrater is a mechanism which maintains a
rating for every other host in the network. To choose a
route that is considered to be reliable, it calculates a
path metric by averaging the rating of the nodes on the
paths and chooses the path with the highest metric. If
any node gets very low rating, it should be considered
as a selfish node and thus excludes them from
routing[14].
1.2.2 Credit-payment technique (incentive
mechanisms)
Butty´an and Hubaux proposed incentives to
cooperate by means of so-called nuglets that serve as a
per-hop payment in every packet in a secure module in
each node to support forwarding. The secure module is
required to ensure the correct number of nuglets is
withdrawn or deposited. They propose two technique
for payment of packet forwarding, the Packet Purse
Model and the Packet Trade Model. In the Packet Purse
Model the sender pays and thus loads the packet with a
number of nuglets. Each intermediate node takes one
nuglet when it forwards the packet. If there are no
nuglets left at an intermediate node, the packet is
dropped. If there are nuglets left in the packet once it
reaches the destination, the nuglets are lost. In the
Packet Trade Model, the destination pays for the packet.
Each intermediate node buys a packet from the previous
hop and sells it to the next for more nuglets.
1.2.3 Game theory based technique
Selfish nodes are sometimes called as freeloaders
getting resources from the network and did not upload
any resources to the network. Minimising the effects of
freeloaders require the services of some external
centralized authority. The inclusion of third party
produces overhead in tracking, storing and processing
the behaviour of other nodes. The behavior of selfish
user depends on the game rule of the games. The
mechanisms design in game theory is to design
appropriate game rule that leads to desirable outcome
which is cooperatively relay of packets in networks.
2. RELATED WORK
Tamper-Proof Device (TPD)-based incentive
mechanism used to manage the credits. The packet
purse and the packet trade models have been used. In
the packet purse model, only the source node pays by
loading some credits in each packet before sending it.
Each intermediate node acquires the amount of credits
that cover the packet’s relaying cost. In the packet trade
model, each intermediate node runs an auction to sell
the packets to the following node in the route. In this
way, each intermediate node earns some credits and the
destination node pays the total packet relaying cost[4].
In Sprite, a simple, cheat-proof, credit based system for
stimulating cooperation among selfish nodes in mobile
ad hoc networks. Our system provides incentive for
mobile nodes to cooperate and report actions honestly.
payments and charges from a game-theoretic
perspective, and they showed that system motivates
each node to report its behavior honestly, even when a
collection of the selfish nodes colludes[16].
In MODSPIRITE system detects selfish node using
neighbor monitoring mechanism and enforce
cooperation among non cooperative node by providing
incentives to intermediate nodes. The architecture of
MODSPIRITE system contains several nodes and a
cluster head. All other nodes communicate with cluster
head and give receipt of forwarding data packet. Cluster
head selection criteria can base on ID, degree, residual
energy, low mobility and association with other nodes.
If data correctly reaches the destination, no credit is lost
or earned by the sender and intermediate nodes
respectively. If the data does not reach the destination, it
indicates that one of the intermediate nodes acts as a
selfish node and this selfishness is detected by Neighbor
Monitoring Mechanism[2].
In RISE, a Receipt-free Incentive SchEme, for MWNs.
The nodes submit lightweight payment reports
containing their alleged charges and rewards to the AC
to clear the payment, and store undeniable security
Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7
3
tokens called evidences. The fair reports can be cleared
with almost no processing overhead. For the cheating
reports, the evidences are requested to identify the
cheating nodes and exclude them. Since cheating is
exceptional, RISE can significantly reduce the overhead
of processing and submitting the payment data
compared to the receipt-based schemes while achieving
the same security strength. Our analysis and simulations
demonstrate that RISE can secure the payment and clear
the payment with almost no processing overhead. For
the cheating reports, our scheme requests the evidences
to identify and evict the cheating nodes[3].
In FESCIM, a Fair, Efficient, and Secure Cooperation
Incentive Mechanism, to stimulate the node cooperation
in MCN. In order to efficiently and securely charge the
source and destination nodes, the lightweight hashing
operations are used in the ACK packets to reduce the
number of the public-key-cryptography operations. The
destination node generates a hash chain and signs its
root, and acknowledges message reception by releasing
a hash value from the hash chain. In this way, the
destination node generates a signature per a group of
messages instead of generating a signature per message.
Moreover, to reduce the overhead of the payment
cheques, one small-size cheque is generated per session
instead of generating a cheque per message, and
Probabilistic cheque submission scheme has been
proposed to reduce the number of submitted cheques
and protect against the collusion attack[1].
3. SYSTEM ARCHITECTURE
3.a Architecture of MWN
3.b Accounting Center
4. PROPOSED SYSTEM
4.1 Route Discovery Phase
All communications are unicast and the nodes
can communicate in both modes: pure ad hoc or hybrid.
The source node’s messages may be relayed in several
hops by the intermediate nodes to the destination node.
The source node transmits its messages to the source
base station (BSS), if necessary in multiple hops. If the
destination node resides in a different cell, the messages
are forwarded to the destination base station (BSD) that
transmits the messages to the destination node possibly
in multiple hops. In an ad-hoc network communication
between two nodes beyond the transmission range relies
on intermediate nodes to forward the packet. The
communication takes place using routing protocol
On demand routing protocol is designed to restrict the
bandwidth consumed by control packets in wireless
networks. Here DSR is used, which is a source routing
protocol and this protocol can react to topological
changes rapidly. DSR is a reactive routing protocol. In
order to establish the end-to-end routing communication
between nodes we are using DSR routing protocol.
There are two main operations in DSR. They are route
discovery and route maintenance. Each node gathers
information about the network topology by overhearing
other nodes’ transmissions. This is known as
indiscriminate mode of operation. Each node maintains
a route cache to remember routes that it has learnt about.
All of the routing protocols including DSR assume that
all nodes in the network are cooperative and forward
others’ messages.
In route discovery phase, the route request packet is
flooded in networks each node in network after
receiving the route request packet, it will rebroadcast the
packet to neighboring nodes. Route request packet
consist of sequence number generated by source nodes
and path it has traversed. A sequence number on packet
is used to prevent loop formation and to avoid multiple
transmission of same route request by intermediate node
and receives it through multiple paths. After receiving
the first route request from source nodes, the destination
nodes replies through reverse path to source nodes. In
pure adhoc mode the source and destination nodes
communicate without any base station and in hybrid
Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7
4
mode as a minimum of one base station is required for
communications.
4.2 Data Transmission and Relay Phase
In this phase source node select the shortest
path to the destination nodes based on number of hop
count in the different ways to reach the destination.
Route reply packet contain session identifier with
destination node signature. The session identifier contain
the identities of the nodes in the route. The source nodes
attaches its certificate to all the data packet to enable the
intermediate and destination nodes to verify the
signature. Each data packet is encrypted using hashing
function with signed signature from source nodes. Every
packet is hashed before it transmitted to neighbor nodes.
Before relaying each intermediate nodes verifies
signature to ensure its integrity and authenticity. Each
data packet has unique number for identification. Each
node the route restarts a timer each time the node
transmit a packet. The route is considered broken when
the time expires. After receiving the acknowledgement
of the last message the source nodes sends end-of-
session packet to close the session. The Source Node
will calculate the RRT (Round Trip Time) of each node
when they packet relayed to destination nodes. The RRT
is used to calculate the trust value of each nodes during
data transmission and which is used to find most trusted
nodes to submit the cheques to accounting center.
4.3 Cheque Composition Phase
In this phase source nodes, destination nodes and
intermediate nodes submit cheques to Accounting
center. The cheque contain descriptor and digital
certificate. The descriptor shows the hashed value of the
message and its unique number. The digital certificate
shows the hashed signature of node identity. The source
node cheque consist of hashed value of last sent data
packet and source and destination node signature. The
destination node cheque consist of hashed value of last
received data packet and source & destination node
signatures. The source node sending token to any one
of the intermediate node that will submit cheque to AC.
Cheques are transmitted to AC once per route.
For each route one cheque containing the data
for all the intermediate nodes can be composed. A
cheque contains two main parts: Descriptor (D) and
Security Token (St). The Descriptor contains Si that has
the identities of the data transmitted and the data
delivered, and TS,. The Descriptor also contains the
messages’number (X), the hash value of the last
received message, the hash chains’ roots and seeds, and
the last released hash value . The Security Token is an
undeniable proof that prevents repudiation and
manipulation, and thus ensures that the cheque is
undeniable, unmodifiable, and unforgeable. In order to
significantly reduce the cheque size, the Security Token
is composed by hashing the source and destination
nodes’ signatures instead of attaching the large-size
signatures. The base station submits the cheque to the
AC for redemption, but the nodes submit the cheque if
the base station belongs to a different operator. The
nodes also submit the cheque if the route is not
complete, i.e., the EOS packet is not received, and the
base station does not have correct information. Finally,
the AC clears the cheque according to the charging and
rewarding policy.
4.3.1 Token based cheque submission
Moreover reducing the overhead of payment
cheques by all intermediate nodes, the token based
cheque submission scheme is proposed. In token based
cheque submission scheme is used to avoid collusion
attacks and reducing the number of cheques sent to
accounting center by all intermediate node at same time.
Token is consist of identities of intermediate nodes,
signature of source and destination nodes and also
contain which intermediate node to possess the token.
The node which have token allowed to send cheque to
accounting center. Source node selects the intermediate
node based on their high credits and trusted value and
send token to that particular intermediate node. Based
on token based scheme the cheque is composed by
intermediate nodes. Trust value is estimated by Trusted
RTT algorithm.
Trusted RTT algorithm
BEGIN;
N, n ≠ 0; // N→Maximum Capacity of network //
n ≤ N; // n→ No. of nodes in routing //
T ϵ n; // T→ trust value //
If (n = = Ack) // if source node receives
acknowledgement //
Set the timer;
else if (n≤ RTT) // Round Trip Time (RTT) //
n++ ; // Increment the trust value //
else if (n ≥ RTT)
n- - ; // Decrement the trust value //
else
node selects next neighbor node to send packets;
END;
4.3.1.1 Round-Trip Time (RTT)
Round-Trip Delay time (RTD) or Round-Trip
Time (RTT) is the length of time it takes for a packet to
be sent plus the length of time it takes for an
acknowledgment of that packet to be received. This
time delay therefore consists of the transmission times
between the two points of a signal. In this Trusted RTT
algorithm starts when number of nodes is less than the
capacity of network. Trust value is belong to routing
nodes. Until the node received with the
acknowledgement, it will compare the response time of
node with Round Trip Time. RTT value is greater than
node response time the node is trusted else the node is
less trusted. The RTT was originally estimated in TCP
by
RTT = (α · Old_RTT) + ((1 − α) ·
New_Round_Trip_Sample)
Where α is constant weighting factor(0 ≤ α < 1).
Choosing a value α close to 1 makes the weighted
average immune to changes that last a short time (e.g., a
single segment that encounters long delay). Choosing a
Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7
5
value for α close to 0 makes the weighted average
respond to changes in delay very quickly. This was
improved by the Jacobson/Karels algorithm, which
takes standard deviation into account as well.
The Source node calculate the trust value of each
intermediate node on routing based on Trusted RTT
algorithm. The intermediate node response time is less
than or equal to RTT (Round Trip Time) are considered
as trusted node. If the time it takes for an
acknowledgment of that packet to be received is higher
than RTT value that it is considered as less trusted
nodes. The trusted node will get the token from source
node and send cheque to accounting center. The source
node selects the intermediate node, to send token to that
node based on their high trust value and high credits.
4.4 Cheque Clearance Phase
In this phase the cheques are evaluated and
credited in node’s account by accounting center. The
accounting center will have some components. They are
classifier, eviction, credit update and trust monitor. The
classifier will check the cheque that is previously
deposited to accounting center and it will classify the
source, destination node and intermediate nodes
cheques. After classification of cheques that will be sent
to eviction process. In eviction process each cheque is
validated by their hashed signatures. Cheque is valid if
the resultant hash value is identical to cheque. If the
given cheque is correct it will credit the node account
increase the trustworthy of node in AC, if the given
cheque is invalid the accounting center will not credit
the node account and decrease the trustworthy in node
account. Trust monitor is used to analyses the node
performance and their trusted values and nodes credit
accounts. Trust monitor will remove the low trusted
node from future data transmission from network based
on their past activities. The source and destination nodes
will be credited for every transmitted messages even if
does not reach the destination but intermediate nodes
rewards only for delivered messages. Here the trust
value of nodes calculated by Source Node during data
transmission will be finally sent to Accounting Center
and these values are updated in trustworthy monitor will
used for future analysis of nodes in routing . The trust
update for node trust value is updated by aggregating its
session rating with its old trust value. Moreover, a node
is identified as malicious when it spends consecutive
sessions in the suspicious state because the node receives
negative ratings more than the normal rate. A node is
also identified as malicious when the difference between
the spent times in the honest and the suspicious states is
less than β because the node receives positive ratings
less than the normal rate. The payment clearance and
trust update delay is the elapsed time from a session’s
occurrence until the payment is cleared and the trust
values are updated. AC provides certificate with unique
identity for each nodes in the networks.
5. SECURITY ANALYSIS
Since the mobile nodes are autonomous and
self-interested, the attacker has full control on his node,
and thus he can change its operation. The hackers work
individually or collude with each other under the
control of one authority to launch sophisticated attacks.
The attackers are rational in the sense that they
misbehave when they can achieve more benefits than
behaving honestly. Specifically, the attackers attempt to
steal credits, pay less, and communicate freely. Since
each node in an Ad-hoc network is constrained by
limited energy, bandwidth and computational resources,
a node may not be willing to forward packets that are
not directly beneficial to it or node attack on routing
protocol to disrupt network performance. Such nodes
are known as Non-cooperative or misbehaving nodes.
Some Common Attacks in Multi-Hop Wireless
Networks
Filtering Attack – In this type of attack, the adversary
can observe and modify both the input and the output of
each device he controls, but he cannot extract the secret
information from these devices.
Collusion Attack – Attackers may work together to
improve their attacking ability.
False Rumour – In false rumor misbehavior, a node
floods the false and negative information regarding
other nodes by claiming that they are misbehaving but
actually they are not.
Collusion Attack – In this attack, two or more nodes
collude in order to influence the reputation rating. Here
a node can recommend others node as cooperative or
can give negative information of cooperative node.
Double-Rewarding attack – The attacker attempts to
illegally increase its rewards by submitting a check
multiple times.
Double-Spending attack – The attacker attempts to
generate identical checks for different sessions to pay
once. Two checks cannot have the same identifier
because it contains the identities of the session nodes
and time stamp.
Free-Riding attacks – Two colluding intermediate
nodes in a legitimate session manipulate the session
packets to piggyback their data to communicate freely.
Impersonation attack – The attackers attempt to
impersonate other nodes to communicate freely or steal
credits.
Denial of Service – Attackers cause denial of service by
preventing the calculation and dissemination of
reputation values.
Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7
6
6. RESULTS & DISCUSSION
The Main aim is to thwart the selfishness attack and
collusion attacks multi-hop wireless networks. In order
to prevent cheque submission collusion attacks we
using a token based cheque submission method. In this
method, node which posses the token which is allowed
to send cheque to accounting center. Source node
which is responsible for the generating token and select
the any of intermediate node in the routing network.
More number cheques is reduced effectively when
compared to existing systems. Trustworthy nodes of
each nodes in routing is monitored by accounting
center , so that the untrusted nodes are removed from
future communications.
Finally, which is used to indentify irrational and
malicious nodes in the networks and this method solves
the several attacks in Multi-hop Cellular Networks.
Impersonation Attack is not possible because the nodes
use their private keys to sign the packets, and the
attackers cannot compute other nodes’ private keys.
Free Riding Attacks is thwarted by, the integrity of the
packets should be checked at each node, and thus, the
first node after the first colluder can detect the packet
manipulation and drop the packet. DOS Attack is
thwarted by token based submission scheme. Incentives
Mechanism is used to prevent the nodes from selfish
behavior. Incentives are used to compensate for nodes
to cooperation in networks.
7. CONCLUSION
Multi-hop Wireless Networks exhibits new
vulnerabilities to malicious attackers and denial of node
cooperation. The attackers collude with each other to
launch sophisticated attacks. The proposed token based
cheque submission scheme to reduce the overhead of
the payment cheques to accounting center and thwart
the collusion attacks. Overall cheque submission to AC
by all the participating nodes routing is reduced by
instead of submitting all intermediate node, the source
node will select any one of the high trusted intermediate
node submit cheques to AC to update credits of routing
nodes based on their high credit and trusted value.
Usually the nodes in the network have some default
credits then only they able to participate in the routing.
Trust value is calculated of each node by Trusted
RTT( round trip time). Token possessed node only able
to send cheque to accounting center. Trustworthy
checker in Accounting center will precisely differentiate
the honest nodes and irrational packet droppers and
remove the selfish nodes from networks. Cheques are
generated per session instead of generating per
messages. Finally we have significantly reduced the
overhead of storing, submitting and processing of
cheques in nodes and accounting center of the multi-
hop wireless networks.
REFERENCES
[1] M. Mahmoud and X. Shen, “FESCIM: Fair, efficient,
and secure cooperation incentive mechanism for hybrid
ad hoc networks”, IEEE Transactions on Mobile
Computing vol.11, no.5, May2012.
[2] Rekha Kaushik, and Jyoti Singhai ,MODSPIRITE: A
Credit Based Solution to Enforce Node Cooperation in an
Ad-hoc Network IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 3, No. 2, May
2011.
[3] Mohamed Elsalih Mahmoud and Xuemin (Sherman)
Shen RISE: Receipt-Free Cooperation Incentive Scheme
for Multihop Wireless Networks IEEE Communications
Society subject matter experts for publication in the IEEE
ICC 2011 proceedings.
[4] M. Mahmoud, and X. Shen, "PIS: A practical incentive
system for multi-hop wireless networks", IEEE
Transactions on Vehicular Technology (IEEE TVT), vol.
59, no. 8, pp. 4012-4025, 2010.
[5] H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M.
Fallah, “A secure credit-based cooperation stimulating
mechanism for MANETs using hash chains”, Future
Generation Computer Systems, vol. 25, issue 8, pp. 926-
934, September 2009.
[6] G. Bella, G. Costantino, and S. Riccobene, “Evaluating
the Device Reputation Through Full Observation in
MANETs,” J. Information Assurance and Security, vol.
4, no. 5, pp. 458-465, Mar. 2009.
[7] Y. Zhang, W. Lou, and Y. Fang, “A secure incentive
protocol for mobile ad hoc networks”, ACM Wireless
Networks, vol. 13, no. 5, pp. 569- 582, October, 2007.
[8] B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of
attacks and counter measures in mobile ad hoc
networks”, Wireless Network Security, Springer
Network Theory and Applications, vol. 17, pp 103- 135,
2007.
[9] J. Pan, L. Cai, X. Shen, and J. Mark, “Identity-based
secure collaboration in wireless ad hoc networks”,
Computer Networks (Elsevier),vol. 51, no. 3, pp. 853-
865, 2007.
[10] Shailender Gupta, C. K. Nagpal and Charu Singla
,Impact of Selfish Node Concentration in Manets ,
International Journal of Wireless & Mobile Networks
(IJWMN) Vol. 3, No. 2, April 2011.
[11] N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, “A
Study of the Energy Consumption Characteristics of
Cryptographic Algorithms and Security Protocols,” IEEE
Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143,
Mar./Apr. 2006.
[12] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas,
“Cooperation Enforcement Schemes for MANETs: A
Survey,” J. Wireless Comm. and Mobile Computing, vol.
6, no. 3, pp. 319-332, 2006.
[13] A. Weyland, T. Staub, and T. Braun, “Comparison of
motivationbased cooperation mechanisms for hybrid
wireless networks”, Journal of Computer
Communications, vol. 29, pp. 2661–2670, 2006.
[14] Tamer Refaei, Vivek Srivastava, LuizDaSilva, “A
Reputation-based Mechanism for Isolating Selfish Nodes
in Ad Hoc Networks”, Proc.IEEE Second Annual
International Conference on Mobile and Ubiquitous
Systems: Networking and Services (MobiQuitous’05),
2005.
[15] M. Jakobsson, J. Hubaux, and L. Buttyan, “A micro-
payment scheme encouraging collaboration in multi-hop
cellular networks”, Proc. of the 7th Financial
Cryptography (FC'03), pp. 15–33, La Guadeloupe,
January 2003.
[16] S. Zhong, J. Chen, and R. Yang, “Sprite: A simple,
cheat-proof, credit based system for mobile ad-hoc
networks”, Proc. of INFOCOM, vol. 3, pp. 1987-1997,
San Francisco, CA, March 30-April 3, 2003.
[17] S. Marti, T.Giuli, K.Lai, and M.Baker, “Mitigating
Routing Misbehavior in Mobile Ad Hoc Networks,”
Proc. ACM MobiCom, pp. 255-265, Aug. 2000.
Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7
7
[18] D. Johnson and D. Maltz, “Dynamic source routing in ad
hoc wireless networks”, Mobile Computing, Chapter 5,
Kluwer Academic Publishers, pp. 153-181, 1996.
[19] A. Menzies, P. Oorschot, and S. Vanstone, “Handbook of
applied cryptography”, CRC Press,
http://www.cacr.math.uwaterloo.ca/hac, Boca Raton,
Fla., 1996.
[20] Nat’l Inst. Standards and Technology (NIST), “Digital
Hash Standard,” Fed. Information Processing Standards
Publication 180-1, Apr. 1995.

More Related Content

What's hot

A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...eSAT Journals
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd Iaetsd
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksPvrtechnologies Nellore
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...chennaijp
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery inambitlick
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Secure Routing using Detection Method in Wireless Ad Hoc network
 Secure Routing using Detection Method in Wireless Ad Hoc network Secure Routing using Detection Method in Wireless Ad Hoc network
Secure Routing using Detection Method in Wireless Ad Hoc networkijsrd.com
 
Community aware opportunistic routing in mobile social network
Community aware opportunistic routing in mobile social networkCommunity aware opportunistic routing in mobile social network
Community aware opportunistic routing in mobile social networkIEEEFINALYEARPROJECTS
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 

What's hot (19)

A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
50 55
50 5550 55
50 55
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Secure Routing using Detection Method in Wireless Ad Hoc network
 Secure Routing using Detection Method in Wireless Ad Hoc network Secure Routing using Detection Method in Wireless Ad Hoc network
Secure Routing using Detection Method in Wireless Ad Hoc network
 
Community aware opportunistic routing in mobile social network
Community aware opportunistic routing in mobile social networkCommunity aware opportunistic routing in mobile social network
Community aware opportunistic routing in mobile social network
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 

Similar to L 1000 423

A Survey of Techniques Used To Detect Selfish Nodes in MANET
 A Survey of Techniques Used To Detect Selfish Nodes in MANET A Survey of Techniques Used To Detect Selfish Nodes in MANET
A Survey of Techniques Used To Detect Selfish Nodes in MANETijsrd.com
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETA Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETIJNSA Journal
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
Detect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharingDetect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharingeSAT Publishing House
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networkstheijes
 
Catching packet droppers and modifiers
Catching packet droppers and modifiersCatching packet droppers and modifiers
Catching packet droppers and modifiersIMPULSE_TECHNOLOGY
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionIOSR Journals
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to L 1000 423 (20)

A Survey of Techniques Used To Detect Selfish Nodes in MANET
 A Survey of Techniques Used To Detect Selfish Nodes in MANET A Survey of Techniques Used To Detect Selfish Nodes in MANET
A Survey of Techniques Used To Detect Selfish Nodes in MANET
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
1 7
1 71 7
1 7
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETA Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
Detect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharingDetect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networks
 
Catching packet droppers and modifiers
Catching packet droppers and modifiersCatching packet droppers and modifiers
Catching packet droppers and modifiers
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
B010110514
B010110514B010110514
B010110514
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
F1074547
F1074547F1074547
F1074547
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

L 1000 423

  • 1. RESEARCH PAPER 1 Volume 3, Issue 3,May-June 2013 Available Online at www.gpublication.com/jcer ISSN No.: 2250-2637 ©Genxcellence Publication 2011, All Rights Reserved Secure and trustworthy incentives cooperation mechanism for multi-hop wireless networks R. Kirubaburi*1 , V.M. Priyadarshini2 *1 Pervasive Computing Technology, Bharathidasan Institute of Technology, Anna University :: Regional Center, Tiruchirappalli, Tamil Nadu, India. srikirubaburi@gmail.com1 2 Assistant Professor, Dept of CSE, Bharathidasan Institute of Technology, Anna University:: Regional Center, Tiruchirappalli, Tamil Nadu, India. vmpriyadarshini@ gmail.com 2 Abstract - In Multi-Hop Wireless Networks (MWN), the mobile nodes usually relay their packets using cooperative nodes. But there are several negative effect in cooperation of nodes and degrade the network performance due to selfish node behavior which will also degrade the connectivity of node, throughput and power consumption. In this paper proposes a secure and trustworthy incentives cooperation mechanism for multi-hop Wireless networks for secure cooperation among trusted nodes and to thwart the selfishness attack, collision attack and Denial of service attacks. To prevent the selfishness node behavior we using incentive mechanisms which will charge nodes efficiently. Hashing operation is used to provides the communication between nodes more securely improves integrity and confidentiality. Token based cheque submission scheme is used to reduce the collusion attacks. The nodes credits are updated and stored by Accounting Center (AC) efficiently which will classify the cheques and verify the certificates from nodes during eviction process. Instead of submitting cheques by all the intermediate node, Source node that will select any one intermediate node based on their credits and trusted node in network to reducing the overhead of payment cheques. Trustworthy Checker components in AC, which will monitor all the node performance in the network and remove the selfishness node from the networks. Trustworthy checker can precisely differentiate between the honest nodes and irrational packet droppers. Extensive analysis and simulation demonstrate that our mechanism can significantly reduce the cheques and allow secure trusted node for communications. Keywords- Incentives; Cheque; Trustworthy; Token; Accounting Center; Round Trip time (RTT); Hashing. INTRODUCTION 1.1 Multi-hop wireless networks In Multi-hop Wireless Networks, the mobile nodes usually relay others packets for enhancing the network performance and deployment. However, the presence of the selfish nodes usually do not cooperate but make use of the cooperative nodes to relay their packets, which has a worst effect on the network fairness and performance. The fundamental idea of Multi-hop communication is to break an original long communication link into two or more shorter links, and it will reduce the required transmission power of each node participating in the communication. Apparently, the decreasing transmission power could also lead to a lower interference level and shorter frequency reuse distance. With small interference, more users can be accepted in the system and the capacity is increased. Multi-hop Wireless Networks (MWNs) such as mobile ad-hoc, vehicular ad-hoc, multi-hop cellular, and wireless mesh networks have been emerging for enabling new applications and enhancing the network performance and deployment. In MWNs, the mobile nodes usually act as routers to relay others’ traffic to the destination. The network nodes usually commit with bandwidth, data storage, CPU cycles, battery power, etc, forming a pool of resources that can be shared by all of them. The utility of the nodes can also obtain from the pooled resources is much higher than that they can obtain on their own. Multi-hop packet relay can extend the communication range using limited transmit power because packets are transmitted over shorter distances. It also can improve the area of spectral efficiency and the network throughput and capacity However, due to the nature of wireless transmission and multi-hop packet relay, MWNs are vulnerable to serious security challenges that endanger their practical implementation. 1.2 Strategies for handling selfish behaviour in nodes Wireless mobile node are usually constrained by computation resources. The nodes which are not willing to forward packet and share the memory resources are called selfish nodes. Non cooperation behavior nodes can significantly adversely affect the entire networks. The selfish nodes do not satisfy neighbor nodes by giving required data to them. In an autonomous ad hoc network, each node is supply with a battery of limited power supply and may act as a service provider. To extend own life, a node may exhibit selfish behavior by benefiting from resources provided by other nodes, without, in return, making available resources of their own devices. Based on node behavior they divided into three they are,
  • 2. Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7 2 1. non selfish nodes, 2. partially selfish nodes, 3. fully selfish nodes. 1.2.1 Reputation based technique In reputation based technique each node monitors the transmission of a neighbor node. Each node in the networks runs the confidant protocol. If the neighbor nodes does not relay the packet correctly it is considered as a selfish nodes. Monitoring the nodes transmissions by overhearing the channel is not energy- efficient for transmitters. The extreme power transmission is used instead of adapting the transmission power according to the distance separating the transmitter and the receiver to enable more neighboring nodes to overhear the packet transmission. In the reputation system maintains a list containing the selfish nodes. When forwarding packets, nodes avoid next nodes on the list. Finally it will drops the request from selfish nodes. In reputation mechanism use the more power consumption other than any method. Each node will loss the energy frequently as they monitoring the networks. There are two technique is used in the reputation based technique they are i. Watchdog Technique. ii. Pathrater Technique. i. Watchdog Technique The Watchdog is one of the mechanisms which detect selfish nodes by running a misbehaving node locator on every host that maintains a buffer of recently sent packets. If the count exceeds a threshold value, the watchdog considers that host as a misbehaving node[14]. ii. Pathrater Technique A Pathrater is a mechanism which maintains a rating for every other host in the network. To choose a route that is considered to be reliable, it calculates a path metric by averaging the rating of the nodes on the paths and chooses the path with the highest metric. If any node gets very low rating, it should be considered as a selfish node and thus excludes them from routing[14]. 1.2.2 Credit-payment technique (incentive mechanisms) Butty´an and Hubaux proposed incentives to cooperate by means of so-called nuglets that serve as a per-hop payment in every packet in a secure module in each node to support forwarding. The secure module is required to ensure the correct number of nuglets is withdrawn or deposited. They propose two technique for payment of packet forwarding, the Packet Purse Model and the Packet Trade Model. In the Packet Purse Model the sender pays and thus loads the packet with a number of nuglets. Each intermediate node takes one nuglet when it forwards the packet. If there are no nuglets left at an intermediate node, the packet is dropped. If there are nuglets left in the packet once it reaches the destination, the nuglets are lost. In the Packet Trade Model, the destination pays for the packet. Each intermediate node buys a packet from the previous hop and sells it to the next for more nuglets. 1.2.3 Game theory based technique Selfish nodes are sometimes called as freeloaders getting resources from the network and did not upload any resources to the network. Minimising the effects of freeloaders require the services of some external centralized authority. The inclusion of third party produces overhead in tracking, storing and processing the behaviour of other nodes. The behavior of selfish user depends on the game rule of the games. The mechanisms design in game theory is to design appropriate game rule that leads to desirable outcome which is cooperatively relay of packets in networks. 2. RELATED WORK Tamper-Proof Device (TPD)-based incentive mechanism used to manage the credits. The packet purse and the packet trade models have been used. In the packet purse model, only the source node pays by loading some credits in each packet before sending it. Each intermediate node acquires the amount of credits that cover the packet’s relaying cost. In the packet trade model, each intermediate node runs an auction to sell the packets to the following node in the route. In this way, each intermediate node earns some credits and the destination node pays the total packet relaying cost[4]. In Sprite, a simple, cheat-proof, credit based system for stimulating cooperation among selfish nodes in mobile ad hoc networks. Our system provides incentive for mobile nodes to cooperate and report actions honestly. payments and charges from a game-theoretic perspective, and they showed that system motivates each node to report its behavior honestly, even when a collection of the selfish nodes colludes[16]. In MODSPIRITE system detects selfish node using neighbor monitoring mechanism and enforce cooperation among non cooperative node by providing incentives to intermediate nodes. The architecture of MODSPIRITE system contains several nodes and a cluster head. All other nodes communicate with cluster head and give receipt of forwarding data packet. Cluster head selection criteria can base on ID, degree, residual energy, low mobility and association with other nodes. If data correctly reaches the destination, no credit is lost or earned by the sender and intermediate nodes respectively. If the data does not reach the destination, it indicates that one of the intermediate nodes acts as a selfish node and this selfishness is detected by Neighbor Monitoring Mechanism[2]. In RISE, a Receipt-free Incentive SchEme, for MWNs. The nodes submit lightweight payment reports containing their alleged charges and rewards to the AC to clear the payment, and store undeniable security
  • 3. Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7 3 tokens called evidences. The fair reports can be cleared with almost no processing overhead. For the cheating reports, the evidences are requested to identify the cheating nodes and exclude them. Since cheating is exceptional, RISE can significantly reduce the overhead of processing and submitting the payment data compared to the receipt-based schemes while achieving the same security strength. Our analysis and simulations demonstrate that RISE can secure the payment and clear the payment with almost no processing overhead. For the cheating reports, our scheme requests the evidences to identify and evict the cheating nodes[3]. In FESCIM, a Fair, Efficient, and Secure Cooperation Incentive Mechanism, to stimulate the node cooperation in MCN. In order to efficiently and securely charge the source and destination nodes, the lightweight hashing operations are used in the ACK packets to reduce the number of the public-key-cryptography operations. The destination node generates a hash chain and signs its root, and acknowledges message reception by releasing a hash value from the hash chain. In this way, the destination node generates a signature per a group of messages instead of generating a signature per message. Moreover, to reduce the overhead of the payment cheques, one small-size cheque is generated per session instead of generating a cheque per message, and Probabilistic cheque submission scheme has been proposed to reduce the number of submitted cheques and protect against the collusion attack[1]. 3. SYSTEM ARCHITECTURE 3.a Architecture of MWN 3.b Accounting Center 4. PROPOSED SYSTEM 4.1 Route Discovery Phase All communications are unicast and the nodes can communicate in both modes: pure ad hoc or hybrid. The source node’s messages may be relayed in several hops by the intermediate nodes to the destination node. The source node transmits its messages to the source base station (BSS), if necessary in multiple hops. If the destination node resides in a different cell, the messages are forwarded to the destination base station (BSD) that transmits the messages to the destination node possibly in multiple hops. In an ad-hoc network communication between two nodes beyond the transmission range relies on intermediate nodes to forward the packet. The communication takes place using routing protocol On demand routing protocol is designed to restrict the bandwidth consumed by control packets in wireless networks. Here DSR is used, which is a source routing protocol and this protocol can react to topological changes rapidly. DSR is a reactive routing protocol. In order to establish the end-to-end routing communication between nodes we are using DSR routing protocol. There are two main operations in DSR. They are route discovery and route maintenance. Each node gathers information about the network topology by overhearing other nodes’ transmissions. This is known as indiscriminate mode of operation. Each node maintains a route cache to remember routes that it has learnt about. All of the routing protocols including DSR assume that all nodes in the network are cooperative and forward others’ messages. In route discovery phase, the route request packet is flooded in networks each node in network after receiving the route request packet, it will rebroadcast the packet to neighboring nodes. Route request packet consist of sequence number generated by source nodes and path it has traversed. A sequence number on packet is used to prevent loop formation and to avoid multiple transmission of same route request by intermediate node and receives it through multiple paths. After receiving the first route request from source nodes, the destination nodes replies through reverse path to source nodes. In pure adhoc mode the source and destination nodes communicate without any base station and in hybrid
  • 4. Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7 4 mode as a minimum of one base station is required for communications. 4.2 Data Transmission and Relay Phase In this phase source node select the shortest path to the destination nodes based on number of hop count in the different ways to reach the destination. Route reply packet contain session identifier with destination node signature. The session identifier contain the identities of the nodes in the route. The source nodes attaches its certificate to all the data packet to enable the intermediate and destination nodes to verify the signature. Each data packet is encrypted using hashing function with signed signature from source nodes. Every packet is hashed before it transmitted to neighbor nodes. Before relaying each intermediate nodes verifies signature to ensure its integrity and authenticity. Each data packet has unique number for identification. Each node the route restarts a timer each time the node transmit a packet. The route is considered broken when the time expires. After receiving the acknowledgement of the last message the source nodes sends end-of- session packet to close the session. The Source Node will calculate the RRT (Round Trip Time) of each node when they packet relayed to destination nodes. The RRT is used to calculate the trust value of each nodes during data transmission and which is used to find most trusted nodes to submit the cheques to accounting center. 4.3 Cheque Composition Phase In this phase source nodes, destination nodes and intermediate nodes submit cheques to Accounting center. The cheque contain descriptor and digital certificate. The descriptor shows the hashed value of the message and its unique number. The digital certificate shows the hashed signature of node identity. The source node cheque consist of hashed value of last sent data packet and source and destination node signature. The destination node cheque consist of hashed value of last received data packet and source & destination node signatures. The source node sending token to any one of the intermediate node that will submit cheque to AC. Cheques are transmitted to AC once per route. For each route one cheque containing the data for all the intermediate nodes can be composed. A cheque contains two main parts: Descriptor (D) and Security Token (St). The Descriptor contains Si that has the identities of the data transmitted and the data delivered, and TS,. The Descriptor also contains the messages’number (X), the hash value of the last received message, the hash chains’ roots and seeds, and the last released hash value . The Security Token is an undeniable proof that prevents repudiation and manipulation, and thus ensures that the cheque is undeniable, unmodifiable, and unforgeable. In order to significantly reduce the cheque size, the Security Token is composed by hashing the source and destination nodes’ signatures instead of attaching the large-size signatures. The base station submits the cheque to the AC for redemption, but the nodes submit the cheque if the base station belongs to a different operator. The nodes also submit the cheque if the route is not complete, i.e., the EOS packet is not received, and the base station does not have correct information. Finally, the AC clears the cheque according to the charging and rewarding policy. 4.3.1 Token based cheque submission Moreover reducing the overhead of payment cheques by all intermediate nodes, the token based cheque submission scheme is proposed. In token based cheque submission scheme is used to avoid collusion attacks and reducing the number of cheques sent to accounting center by all intermediate node at same time. Token is consist of identities of intermediate nodes, signature of source and destination nodes and also contain which intermediate node to possess the token. The node which have token allowed to send cheque to accounting center. Source node selects the intermediate node based on their high credits and trusted value and send token to that particular intermediate node. Based on token based scheme the cheque is composed by intermediate nodes. Trust value is estimated by Trusted RTT algorithm. Trusted RTT algorithm BEGIN; N, n ≠ 0; // N→Maximum Capacity of network // n ≤ N; // n→ No. of nodes in routing // T ϵ n; // T→ trust value // If (n = = Ack) // if source node receives acknowledgement // Set the timer; else if (n≤ RTT) // Round Trip Time (RTT) // n++ ; // Increment the trust value // else if (n ≥ RTT) n- - ; // Decrement the trust value // else node selects next neighbor node to send packets; END; 4.3.1.1 Round-Trip Time (RTT) Round-Trip Delay time (RTD) or Round-Trip Time (RTT) is the length of time it takes for a packet to be sent plus the length of time it takes for an acknowledgment of that packet to be received. This time delay therefore consists of the transmission times between the two points of a signal. In this Trusted RTT algorithm starts when number of nodes is less than the capacity of network. Trust value is belong to routing nodes. Until the node received with the acknowledgement, it will compare the response time of node with Round Trip Time. RTT value is greater than node response time the node is trusted else the node is less trusted. The RTT was originally estimated in TCP by RTT = (α · Old_RTT) + ((1 − α) · New_Round_Trip_Sample) Where α is constant weighting factor(0 ≤ α < 1). Choosing a value α close to 1 makes the weighted average immune to changes that last a short time (e.g., a single segment that encounters long delay). Choosing a
  • 5. Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7 5 value for α close to 0 makes the weighted average respond to changes in delay very quickly. This was improved by the Jacobson/Karels algorithm, which takes standard deviation into account as well. The Source node calculate the trust value of each intermediate node on routing based on Trusted RTT algorithm. The intermediate node response time is less than or equal to RTT (Round Trip Time) are considered as trusted node. If the time it takes for an acknowledgment of that packet to be received is higher than RTT value that it is considered as less trusted nodes. The trusted node will get the token from source node and send cheque to accounting center. The source node selects the intermediate node, to send token to that node based on their high trust value and high credits. 4.4 Cheque Clearance Phase In this phase the cheques are evaluated and credited in node’s account by accounting center. The accounting center will have some components. They are classifier, eviction, credit update and trust monitor. The classifier will check the cheque that is previously deposited to accounting center and it will classify the source, destination node and intermediate nodes cheques. After classification of cheques that will be sent to eviction process. In eviction process each cheque is validated by their hashed signatures. Cheque is valid if the resultant hash value is identical to cheque. If the given cheque is correct it will credit the node account increase the trustworthy of node in AC, if the given cheque is invalid the accounting center will not credit the node account and decrease the trustworthy in node account. Trust monitor is used to analyses the node performance and their trusted values and nodes credit accounts. Trust monitor will remove the low trusted node from future data transmission from network based on their past activities. The source and destination nodes will be credited for every transmitted messages even if does not reach the destination but intermediate nodes rewards only for delivered messages. Here the trust value of nodes calculated by Source Node during data transmission will be finally sent to Accounting Center and these values are updated in trustworthy monitor will used for future analysis of nodes in routing . The trust update for node trust value is updated by aggregating its session rating with its old trust value. Moreover, a node is identified as malicious when it spends consecutive sessions in the suspicious state because the node receives negative ratings more than the normal rate. A node is also identified as malicious when the difference between the spent times in the honest and the suspicious states is less than β because the node receives positive ratings less than the normal rate. The payment clearance and trust update delay is the elapsed time from a session’s occurrence until the payment is cleared and the trust values are updated. AC provides certificate with unique identity for each nodes in the networks. 5. SECURITY ANALYSIS Since the mobile nodes are autonomous and self-interested, the attacker has full control on his node, and thus he can change its operation. The hackers work individually or collude with each other under the control of one authority to launch sophisticated attacks. The attackers are rational in the sense that they misbehave when they can achieve more benefits than behaving honestly. Specifically, the attackers attempt to steal credits, pay less, and communicate freely. Since each node in an Ad-hoc network is constrained by limited energy, bandwidth and computational resources, a node may not be willing to forward packets that are not directly beneficial to it or node attack on routing protocol to disrupt network performance. Such nodes are known as Non-cooperative or misbehaving nodes. Some Common Attacks in Multi-Hop Wireless Networks Filtering Attack – In this type of attack, the adversary can observe and modify both the input and the output of each device he controls, but he cannot extract the secret information from these devices. Collusion Attack – Attackers may work together to improve their attacking ability. False Rumour – In false rumor misbehavior, a node floods the false and negative information regarding other nodes by claiming that they are misbehaving but actually they are not. Collusion Attack – In this attack, two or more nodes collude in order to influence the reputation rating. Here a node can recommend others node as cooperative or can give negative information of cooperative node. Double-Rewarding attack – The attacker attempts to illegally increase its rewards by submitting a check multiple times. Double-Spending attack – The attacker attempts to generate identical checks for different sessions to pay once. Two checks cannot have the same identifier because it contains the identities of the session nodes and time stamp. Free-Riding attacks – Two colluding intermediate nodes in a legitimate session manipulate the session packets to piggyback their data to communicate freely. Impersonation attack – The attackers attempt to impersonate other nodes to communicate freely or steal credits. Denial of Service – Attackers cause denial of service by preventing the calculation and dissemination of reputation values.
  • 6. Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7 6 6. RESULTS & DISCUSSION The Main aim is to thwart the selfishness attack and collusion attacks multi-hop wireless networks. In order to prevent cheque submission collusion attacks we using a token based cheque submission method. In this method, node which posses the token which is allowed to send cheque to accounting center. Source node which is responsible for the generating token and select the any of intermediate node in the routing network. More number cheques is reduced effectively when compared to existing systems. Trustworthy nodes of each nodes in routing is monitored by accounting center , so that the untrusted nodes are removed from future communications. Finally, which is used to indentify irrational and malicious nodes in the networks and this method solves the several attacks in Multi-hop Cellular Networks. Impersonation Attack is not possible because the nodes use their private keys to sign the packets, and the attackers cannot compute other nodes’ private keys. Free Riding Attacks is thwarted by, the integrity of the packets should be checked at each node, and thus, the first node after the first colluder can detect the packet manipulation and drop the packet. DOS Attack is thwarted by token based submission scheme. Incentives Mechanism is used to prevent the nodes from selfish behavior. Incentives are used to compensate for nodes to cooperation in networks. 7. CONCLUSION Multi-hop Wireless Networks exhibits new vulnerabilities to malicious attackers and denial of node cooperation. The attackers collude with each other to launch sophisticated attacks. The proposed token based cheque submission scheme to reduce the overhead of the payment cheques to accounting center and thwart the collusion attacks. Overall cheque submission to AC by all the participating nodes routing is reduced by instead of submitting all intermediate node, the source node will select any one of the high trusted intermediate node submit cheques to AC to update credits of routing nodes based on their high credit and trusted value. Usually the nodes in the network have some default credits then only they able to participate in the routing. Trust value is calculated of each node by Trusted RTT( round trip time). Token possessed node only able to send cheque to accounting center. Trustworthy checker in Accounting center will precisely differentiate the honest nodes and irrational packet droppers and remove the selfish nodes from networks. Cheques are generated per session instead of generating per messages. Finally we have significantly reduced the overhead of storing, submitting and processing of cheques in nodes and accounting center of the multi- hop wireless networks. REFERENCES [1] M. Mahmoud and X. Shen, “FESCIM: Fair, efficient, and secure cooperation incentive mechanism for hybrid ad hoc networks”, IEEE Transactions on Mobile Computing vol.11, no.5, May2012. [2] Rekha Kaushik, and Jyoti Singhai ,MODSPIRITE: A Credit Based Solution to Enforce Node Cooperation in an Ad-hoc Network IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011. [3] Mohamed Elsalih Mahmoud and Xuemin (Sherman) Shen RISE: Receipt-Free Cooperation Incentive Scheme for Multihop Wireless Networks IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings. [4] M. Mahmoud, and X. Shen, "PIS: A practical incentive system for multi-hop wireless networks", IEEE Transactions on Vehicular Technology (IEEE TVT), vol. 59, no. 8, pp. 4012-4025, 2010. [5] H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. Fallah, “A secure credit-based cooperation stimulating mechanism for MANETs using hash chains”, Future Generation Computer Systems, vol. 25, issue 8, pp. 926- 934, September 2009. [6] G. Bella, G. Costantino, and S. Riccobene, “Evaluating the Device Reputation Through Full Observation in MANETs,” J. Information Assurance and Security, vol. 4, no. 5, pp. 458-465, Mar. 2009. [7] Y. Zhang, W. Lou, and Y. Fang, “A secure incentive protocol for mobile ad hoc networks”, ACM Wireless Networks, vol. 13, no. 5, pp. 569- 582, October, 2007. [8] B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey of attacks and counter measures in mobile ad hoc networks”, Wireless Network Security, Springer Network Theory and Applications, vol. 17, pp 103- 135, 2007. [9] J. Pan, L. Cai, X. Shen, and J. Mark, “Identity-based secure collaboration in wireless ad hoc networks”, Computer Networks (Elsevier),vol. 51, no. 3, pp. 853- 865, 2007. [10] Shailender Gupta, C. K. Nagpal and Charu Singla ,Impact of Selfish Node Concentration in Manets , International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 2, April 2011. [11] N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, “A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols,” IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Mar./Apr. 2006. [12] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, “Cooperation Enforcement Schemes for MANETs: A Survey,” J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 319-332, 2006. [13] A. Weyland, T. Staub, and T. Braun, “Comparison of motivationbased cooperation mechanisms for hybrid wireless networks”, Journal of Computer Communications, vol. 29, pp. 2661–2670, 2006. [14] Tamer Refaei, Vivek Srivastava, LuizDaSilva, “A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks”, Proc.IEEE Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’05), 2005. [15] M. Jakobsson, J. Hubaux, and L. Buttyan, “A micro- payment scheme encouraging collaboration in multi-hop cellular networks”, Proc. of the 7th Financial Cryptography (FC'03), pp. 15–33, La Guadeloupe, January 2003. [16] S. Zhong, J. Chen, and R. Yang, “Sprite: A simple, cheat-proof, credit based system for mobile ad-hoc networks”, Proc. of INFOCOM, vol. 3, pp. 1987-1997, San Francisco, CA, March 30-April 3, 2003. [17] S. Marti, T.Giuli, K.Lai, and M.Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom, pp. 255-265, Aug. 2000.
  • 7. Please Cite this Article at: R.Kirubaburi et al, Journal of Current Engineering Research, 3 (3),May-June 2013, 1-7 7 [18] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks”, Mobile Computing, Chapter 5, Kluwer Academic Publishers, pp. 153-181, 1996. [19] A. Menzies, P. Oorschot, and S. Vanstone, “Handbook of applied cryptography”, CRC Press, http://www.cacr.math.uwaterloo.ca/hac, Boca Raton, Fla., 1996. [20] Nat’l Inst. Standards and Technology (NIST), “Digital Hash Standard,” Fed. Information Processing Standards Publication 180-1, Apr. 1995.