Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network

被引:0
作者
Mahdi Bounouni
Louiza Bouallouche-Medjkoune
机构
[1] University of Bejaia,LaMOS Research Unit, Faculty of Exact Sciences
[2] University of Setif 2,Faculty of Law and Political Sciences
来源
The Journal of Supercomputing | 2018年 / 74卷
关键词
MANET; Malicious nodes; Selfish nodes; Reputation; Credit; Performance evaluation;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose an acknowledgment-based punishment and stimulation scheme, called APS. The purposes are to punish malicious nodes dropping data packets and to stimulate the cooperation of selfish nodes. APS approach is structured around four interactive modules. The monitoring module monitors the correct forwarding of routing and data packets. The reputation module assesses the reputation of neighbors. We have proposed a reputation exchange method that enables nodes to share their recommendations about other nodes only within their neighborhoods, and the combination is done based on CIF rules (Combined trust on Importance Factor). The stimulator module is responsible for updating and managing the nodes credit accounts. The price and the reward in term of credit are determined based on the cooperativeness state of a node. Finally, the isolator module punishes both malicious and selfish nodes. The simulation results show that APS scheme increases the throughput and minimizes the malicious dropping ratio, while improving the success ratio of cooperative nodes, and reducing the success ratio and the isolation time of selfish nodes as well.
引用
收藏
页码:5373 / 5398
页数:25
相关论文
共 50 条
  • [41] Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks
    Yao, Yu
    Zhe, Li
    Jun, Liu
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 518 - 521
  • [42] A Trusted Node Based Checkpointing Scheme for Mobile Ad-hoc Networks (MANETs)
    Khamrui, Pulak
    Majumder, Koushik
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 831 - 836
  • [43] A Key Management Scheme Based on Double matrix CPK for Mobile Ad Hoc Networks
    Li, Hongxin
    Su, Jinhai
    Zhang, Chuanfu
    Shao, Chunyu
    ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 543 - 548
  • [44] A New Local Repair Scheme Based on Link Breaks for Mobile Ad Hoc Networks
    Qu, Hua
    Zhang, Peng
    Zhao, Ji-hong
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 364 - +
  • [45] Zone Based Multicast Routing Protocol for Mobile Ad-Hoc Network
    Kavitha, K.
    Selvakumar, K.
    Nithya, T.
    Sathyabama, S.
    2013 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN VLSI, EMBEDDED SYSTEM, NANO ELECTRONICS AND TELECOMMUNICATION SYSTEM (ICEVENT 2013), 2013,
  • [46] Security Challenges in Reactive Mobile Ad Hoc Network
    Ghosh, Chinmay
    Jana, Debasish
    Bhaumik, Bijan Bihari
    2011 ANNUAL IEEE INDIA CONFERENCE (INDICON-2011): ENGINEERING SUSTAINABLE SOLUTIONS, 2011,
  • [47] Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks
    Kim, Young-Duk
    Kim, Jin-Wook
    Kang, Won-Seok
    Lee, Dong-Ha
    NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2008, 5186 : 81 - 90
  • [48] Capacity of Network Coding for Mobile Ad Hoc Networks
    Shi, Yan
    Sheng, Min
    Li, Jiandong
    Zhang, Wenbing
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [49] An optimized AODV protocol in mobile ad hoc network
    Zhao Qiang
    Zhu Hongbo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 2612 - 2615
  • [50] IP address assignment in a mobile ad hoc network
    Mohsin, M
    Prakash, R
    2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 856 - 861