Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network

被引:0
|
作者
Mahdi Bounouni
Louiza Bouallouche-Medjkoune
机构
[1] University of Bejaia,LaMOS Research Unit, Faculty of Exact Sciences
[2] University of Setif 2,Faculty of Law and Political Sciences
来源
The Journal of Supercomputing | 2018年 / 74卷
关键词
MANET; Malicious nodes; Selfish nodes; Reputation; Credit; Performance evaluation;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose an acknowledgment-based punishment and stimulation scheme, called APS. The purposes are to punish malicious nodes dropping data packets and to stimulate the cooperation of selfish nodes. APS approach is structured around four interactive modules. The monitoring module monitors the correct forwarding of routing and data packets. The reputation module assesses the reputation of neighbors. We have proposed a reputation exchange method that enables nodes to share their recommendations about other nodes only within their neighborhoods, and the combination is done based on CIF rules (Combined trust on Importance Factor). The stimulator module is responsible for updating and managing the nodes credit accounts. The price and the reward in term of credit are determined based on the cooperativeness state of a node. Finally, the isolator module punishes both malicious and selfish nodes. The simulation results show that APS scheme increases the throughput and minimizes the malicious dropping ratio, while improving the success ratio of cooperative nodes, and reducing the success ratio and the isolation time of selfish nodes as well.
引用
收藏
页码:5373 / 5398
页数:25
相关论文
共 50 条
  • [21] Efficient Scalable Clustering Scheme for Pseudolinear Mobile Ad hoc Network
    Amjad, Mahfida
    Zaman, Ambreen
    Sakib, Kazi
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [22] Distributed QoS scheme for multimedia communication in mobile ad hoc network
    Haq, MA
    Matsumoto, M
    Bordim, JL
    Tanaka, S
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (09) : 3614 - 3622
  • [23] A novel QOS routing scheme in mobile ad hoc network - LAQR
    Zhou, Z
    Jiang, ZQ
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 863 - 867
  • [24] On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
    Yap, Wun-She
    Liu, Joseph K.
    Tan, Syh-Yuan
    Goi, Bok-Min
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3094 - 3098
  • [25] Multimedia contents caching scheme in mobile ad-hoc network
    Kim, Iksoo, 1600, Science and Engineering Research Support Society (09):
  • [26] A Safety Group Key Management Scheme in Mobile Ad Hoc Network
    Ye, Yongfei
    Zhao, Xiqing
    Guo, Xifeng
    PROCEEDINGS OF 2009 8TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY, VOLS I AND II: HIGHLY RELIABLE, EASY TO MAINTAIN AND READY TO SUPPORT, 2009, : 512 - 515
  • [27] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs
    Heydari, Vahid
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
  • [28] A Trusted Connection Based Scheme for Ad Hoc Network
    Xie, Weichao
    Wang, Jian
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 34 - 38
  • [29] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [30] A scalable mobility-based replica allocation scheme in a mobile ad-hoc network
    Kim, Sun-Kyum
    Yoon, Ji-Hyeun
    Lee, Kwang-Jo
    Choi, Jae-Ho
    Yang, Sung-Bong
    TELECOMMUNICATION SYSTEMS, 2015, 60 (02) : 239 - 250