A secure incentive architecture for ad hoc networks

Qi He, Dapeng Wu, Pradeep Khosla

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

34 Citations (Scopus)

Abstract

In an ad hoc network, intermediate nodes on a communication path are expected to forward packets of other nodes so that the mobile nodes can communicate beyond their wireless transmission range. However, because wireless mobile nodes are usually constrained by limited power and computation resources, a selfish node may be unwilling to spend its resources in forwarding packets which are not of its direct interest, even though it expects other nodes to forward its packets to the destination. It has been shown that the presence of such selfish nodes degrades the overall performance of a non-cooperative ad hoc network. To address this problem, we propose a secure and objective reputation-based incentive (SORI) architecture to encourage packet forwarding and discipline selfish behavior. Different from existing schemes, under our architecture, the reputation of a node is quantified by objective measures; the propagation of reputation is efficiently secured by a one-way-hash-chain-based authentication scheme; and secure routing is in place. Armed with the reputation-based mechanism, we design a punishment scheme to penalize selfish nodes. The experimental results show that the proposed scheme can successfully identify selfish nodes and punish them accordingly. Copyright © 2006 John Wiley & Sons, Ltd.
Original languageEnglish
Pages (from-to)333-346
JournalWireless Communications and Mobile Computing
Volume6
Issue number3
DOIs
Publication statusPublished - May 2006
Externally publishedYes

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Research Keywords

  • Incentive
  • Non-cooperative ad hoc networks
  • Packet forwarding
  • Reputation
  • Security techniques and systems
  • Selfish behavior

Fingerprint

Dive into the research topics of 'A secure incentive architecture for ad hoc networks'. Together they form a unique fingerprint.

Cite this