Open Access   Article Go Back

An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks

Megha ani R1 , arshavardhan H2

Section:Research Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 114-119, May-2016

Online published on Jun 07, 2016

Copyright © Megha Rani R, Harshavardhan H . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Megha Rani R, Harshavardhan H , “An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.114-119, 2016.

MLA Style Citation: Megha Rani R, Harshavardhan H "An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks." International Journal of Computer Sciences and Engineering 04.03 (2016): 114-119.

APA Style Citation: Megha Rani R, Harshavardhan H , (2016). An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks. International Journal of Computer Sciences and Engineering, 04(03), 114-119.

BibTex Style Citation:
@article{R_2016,
author = { Megha Rani R, Harshavardhan H },
title = {An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {114-119},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=76},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=76
TI - An Incentive And Trustworthy Systems With E-Star For Heterogenous Multihop Wireless Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Megha Rani R, Harshavardhan H
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 114-119
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

For establishing stable and reliable routes in heterogeneous multi-hop wireless networks (HMWNs) a secure protocol for Establishing STable and reliable Routes (E-STAR) is proposed. It integrates incentive and trust systems with a trust-and energy-aware routing protocol. Compensating the nodes that relay others packets and charge those that send packets are main aims of incentive systems. The nodes competence and reliability in relaying packets in terms of multi-dimensional trust values are main attractions. The trust values are attached to the nodes public-key certificates to be used in making routing decisions. Two routing protocols is developed to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can prompt the nodes in maintaining route stability and reporting correct battery energy capability. Because any loss of trust will result in loss of future gains. Moreover, for the efficient implementation processing the incentive receipts for computing trust values are necessary. Analytical results demonstrate protocol is without false allegations. Improvement in the packet delivery ratio and route stability are proved through simulation results.

Key-Words / Index Term

Securing heterogeneous multi-hop wireless networks, packet dropping and selfishness attacks, trust systems, and secure routing protocols

References

[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[2] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[3] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, pp. 255-265, Aug. 2000.
[4] X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3, pp. 229-242, 2012. SIGMOBILE Mob. Comput. Commun. Rev., vol. 9, no. 2, pp. 4–18, Apr. 2005.
[5] Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014
[6] M. Mahmoud and X. Shen, “PIS: A Practical Incentive System For Multi-Hop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
[7] M. Mahmoud and X. Shen, “ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011.
[8] M. Mahmoud and X. Shen, “An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Drop in Multihop Wireless Networks,” IEEE Trans. Vehicular Technology, vol. 60, no. 8, pp. 3947-3962, Oct. 2011.
[9] G. Theodorakopoulos and J.S. Baras, “On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318-328, Feb. 2006.
[10] P. Velloso, R. Laufer, D. Cunha, O. Duarte, and G. Pujolle, “Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,” IEEE Trans. Network and Service Management, vol. 7, no. 3, pp. 172-185, Sept. 2010.
[11] Harkiranpreet Kaur and Rasneet Kaur, "To Study the Various Attacks and Protocols in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (210-212), Apr -2016, E-ISSN: 2347-2693
[12] Mohamed M.E.A. Mahmoud, Xiaodong Lin, and Xuemin (Sherman) Shen, “Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks,” IEEE transactions on parallel and distributed systems, vol. 26, no. 4, April 2015
[13] A.Sreelatha , Dr.A.VinayaBabu , K.Madhukar , S.Nagaprasad , D.Marlene Grace Verghese , V.Mallaiah , A.Pratima ,” Mobile Wireless Enhanced Routing Protocol in Adhoc Networks” IJCSE, 2010; 2(7) 2398–2401