2009
DOI: 10.1007/s11036-009-0164-7
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Mechanism Design-Based and Game Theoretical Model for MANETs

Abstract: ., resource consumption). In this paper, we propose a model based on mechanism design that will allow clusters with single trusted node (CA) to be created. Our mechanism will motivate nodes that do not belong to the confident community to participate by giving them incentives in the form of trust, which can be used for cluster's services. To achieve this goal, a RA selection algorithm is proposed that selects nodes based on a predefined selection criteria function and location (i.e., using directional antenna)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Similarly, to balance the nodes' energy consumption and avoid the situation where there are some higher energy level nodes still in a dead network, the selection of a lower energy level node should have a higher cost than selecting a higher energy level node. Thus, we define the cost matrices for the simulation as follows: C1 = [5.5, 7.5, 11, 25, 31, 37, 43, 52, 63], C2 = [6,8,11,23,30,35,42,50,62], C3 = [6.5, 8.5, 12, 21, 28, 33, 40, 48, 60], C4 = [8,10,13,18,25,30,37,45,55], C5 = [8.5, 11, 15, 19, 27, 32, 38, 47, 58], C6 = [9,10,15,20,28,32,38,48,59], C7 = [9,12,16,15,20,28,33,40,50], C8 = [10,13,18,16,21,28,34,42,51], and C9 = [11,…”
Section: Simulation Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, to balance the nodes' energy consumption and avoid the situation where there are some higher energy level nodes still in a dead network, the selection of a lower energy level node should have a higher cost than selecting a higher energy level node. Thus, we define the cost matrices for the simulation as follows: C1 = [5.5, 7.5, 11, 25, 31, 37, 43, 52, 63], C2 = [6,8,11,23,30,35,42,50,62], C3 = [6.5, 8.5, 12, 21, 28, 33, 40, 48, 60], C4 = [8,10,13,18,25,30,37,45,55], C5 = [8.5, 11, 15, 19, 27, 32, 38, 47, 58], C6 = [9,10,15,20,28,32,38,48,59], C7 = [9,12,16,15,20,28,33,40,50], C8 = [10,13,18,16,21,28,34,42,51], and C9 = [11,…”
Section: Simulation Experiments and Resultsmentioning
confidence: 99%
“…Following this approach, the authors of [19] present low overhead truthful routing protocol (LOTTO), a low-overhead truthful routing protocol for route discovery in MANETs with selfish nodes by designing incentives based on VCG mechanism [12], to prevent nodes from revealing fake information and ensure truth telling to be the dominant strategy among all nodes. In [20], a mechanism-design-based model is proposed to motivate nodes that do not belong to the confident community to participate in being selected as RA, by giving them incentives in the form of trust. An RA selection algorithm is also proposed in this paper to select nodes based on a predefined selection criteria function and nodes location.…”
Section: Related Workmentioning
confidence: 99%
“…Incentive is proposed through the game theory as it is the case in [14], where authors enhance the security in mobile ad hoc networks. They motivate nodes to cooperate by increasing their reputation with an authority, which provides them some privileges in the network.…”
Section: B Incentive Approaches Based On Infrastructure Deploymentmentioning
confidence: 99%
“…The proposed incentive models for cooperation are using the concept of virtual cash. For instance, many incentive models based on game theory are proposed [13,14]. The nodes are rewarded for forwarding packets by trading virtual cash with source and next hop nodes [13].…”
Section: Non-cooperative Nodes Monitoring and Detection Modelsmentioning
confidence: 99%