GUO Yuanbo, MA Jianfeng, WANG Chao, et al., “Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 820-825, 2013,
Citation: GUO Yuanbo, MA Jianfeng, WANG Chao, et al., “Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs,” Chinese Journal of Electronics, vol. 22, no. 4, pp. 820-825, 2013,

Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs

Funds:  This work is supported by the Excellent Youth Foundation of He'nan Scientific Committee (No.104100510025) and the National Natural Science Foundation of China (No.60633020).
  • Received Date: 2012-10-01
  • Rev Recd Date: 2013-01-01
  • Publish Date: 2013-09-25
  • The design of threshold based distributed Certification authority (CA) has been proposed to provide secure and efficient key management service in Mobile ad hoc networks (MANETs), but most of previous work ignore the efficiency and effectiveness and assuming there are always honest nodes performing the service. Focusing on developing a model to select a coalition of nodes dynamically and optimally to carry out the threshold key management service in MANETs, we formulate the dynamic nodes selection problem as combinatorial optimization problem, with the objectives of maximizing the success ratio of the service and minimizing the nodes' cost of security and energy, and then extend the payment structure of the classical Vickrey, Clarke and Groves (VCG) mechanism design framework to ensure truth-telling is the dominant strategy for any node in our scenario. Compared with existing works in the presence of selfish nodes, the proposed model enjoys an improvement of both the success ratio of key management service and lifetime of the network, and a reduction of both the cost of participating nodes and compromising probability of MANETs.
  • loading
  • G. Xudong, X. Yan, L. Qiwei, et al., “A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics”, Chinese Journal of Electronics, Vol.22, No.1, pp.155-159, 2013.
    L. Zhou and Z. Haas, “Securing ad hoc networks”, IEEE Network,Vol.13, No.6, pp.24-30, 1999.
    B. Zhu, F. Bao, R.H. Deng, M.S. Kankanhalli and G. Wang,“Efficient and robust key management for large mobile adh oc networks”, Computer Networks, Vol.48, No.4, pp.657-682,2 005.
    S. Raghani, D. Toshniwal and R. Joshi, “Dynamic support ford istributed certification authority in mobile ad hoc networks”, Proceedings of the 2006 International Conference on HybridI nformation Technology-Volume 01, Washington, DC, USA,p p.424-432, 2006.
    A.Z. Ghalwash, A.A.A. Youssif, S.M. Hashad and R. Doss,“Self adjusted security architecture for mobile ad hoc networksM ANETs”, 6th Annual IEEE/ACIS International Conferenceo n Computer and Information Science, pp.682-687, 2007.
    K. Hamouid and K. Adi, “Secure and robust threshold key management( SRKM) scheme for ad hoc networks”, Security and Communication Networks, Vol.3, No.6, pp.517-534, 2010.
    F.R. Yu and H. Tang, “Distributed node selection for thresholdk ey management with intrusion detection in mobile ad hoc networks”,W ireless Networks, Vol.16, No.8, pp.2169-2178, 2010.
    A. Mas-Colell, M.D. Whinston and J.R. Green, MicroeconomicT heory, Oxford: Oxford University Press, 1995.
    L. Anderegg and S. Eidenbenz, “Ad hoc-VCG: a truthful andc ost-efficient routing protocol for mobile ad hoc networks withs elfish agents”, Proceedings of the 9th annual international conferenceo n Mobile computing and networking, New York, NY,U SA, pp.245-259, 2003.
    Y. Wang and M. Singhal, “On improving the efficiency of truthfulr outing in MANETs with selfish nodes”, Pervasive and Mobile Computing, Vol.3, No.5, pp.537-559, 2007.
    A. Rachedi, A. Benslimane, H. Otrok, N. Mohammed and M.D ebbabi, “A Secure mechanism design-based and game theoreticalm odel for MANETs”, Mobile Networks and Applications,Vol.15, No.2, pp.191-204, 2010.
    N. Mohammed, H. Otrok, L. Wang, M. Debbabi and P. Bhattacharya,“Mechanism design based secure leader election modelf or intrusion detection in MANET”, IEEE Transactions on Dependable and Secure Computing, Vol.8, No.1, pp.89-103, 2011.
    Leonid Hurwicz and Stanley Reiter, Designing Economic Mechanisms,1 st ed. Cambridge: Cambridge University Press, 2008.
    H. Garcia-Molina, “Elections in a distributed computing system”,I EEE Transactions on Computers, Vol.C-31, No.1,p p.48-59, 1982.
    A. Derhab and N. Badache, “A self-stabilizing leader electiona lgorithm in highly dynamic ad hoc mobile networks”, IEEET ransactions on Parallel and Distributed Systems, Vol.19, No.7,p p.926-939, 2008
    P. Hu, Z. Zhou, Q. Liu and F. Li, “The HMM-based modelingf or the energy level prediction in wireless sensor networks”, 2ndI EEE Conference on Industrial Electronics and Applications,p p.2253-2258, 2007.
    K. Miettinen, Non Linear Multi-objective Optimization, Norwell:Kluwer Academic Publisers, 1999.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (585) PDF downloads(998) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return