RESEARCH PAPER 1 Volume 3, Issue 3,May-June 2013 Available Online at www.gpublication.com/jcer ISSN No.: 2250-2637 ©Genxcellence Publication 2011, All Rights Reserved Secure and trustworthy incentives cooperation mechanism for multi-hop wireless networks R. Kirubaburi *1 , V.M. Priyadarshini 2 * 1 Pervasive Computing Technology, Bharathidasan Institute of Technology, Anna University :: Regional Center, Tiruchirappalli, Tamil Nadu, India. srikirubaburi@gmail.com 1 2 Assistant Professor, Dept of CSE, Bharathidasan Institute of Technology, Anna University:: Regional Center, Tiruchirappalli, Tamil Nadu, India. vmpriyadarshini@ gmail.com 2 Abstract - In Multi-Hop Wireless Networks (MWN), the mobile nodes usually relay their packets using cooperative nodes. But there are several negative effect in cooperation of nodes and degrade the network performance due to selfish node behavior which will also degrade the connectivity of node, throughput and power consumption. In this paper proposes a secure and trustworthy incentives cooperation mechanism for multi-hop Wireless networks for secure cooperation among trusted nodes and to thwart the selfishness attack, collision attack and Denial of service attacks. To prevent the selfishness node behavior we using incentive mechanisms which will charge nodes efficiently. Hashing operation is used to provides the communication between nodes more securely improves integrity and confidentiality. Token based cheque submission scheme is used to reduce the collusion attacks. The nodes credits are updated and stored by Accounting Center (AC) efficiently which will classify the cheques and verify the certificates from nodes during eviction process. Instead of submitting cheques by all the intermediate node, Source node that will select any one intermediate node based on their credits and trusted node in network to reducing the overhead of payment cheques. Trustworthy Checker components in AC, which will monitor all the node performance in the network and remove the selfishness node from the networks. Trustworthy checker can precisely differentiate between the honest nodes and irrational packet droppers. Extensive analysis and simulation demonstrate that our mechanism can significantly reduce the cheques and allow secure trusted node for communications. Keywords- Incentives; Cheque; Trustworthy; Token; Accounting Center; Round Trip time (RTT); Hashing. INTRODUCTION 1.1 Multi-hop wireless networks In Multi-hop Wireless Networks, the mobile nodes usually relay others packets for enhancing the network performance and deployment. However, the presence of the selfish nodes usually do not cooperate but make use of the cooperative nodes to relay their packets, which has a worst effect on the network fairness and performance. The fundamental idea of Multi-hop communication is to break an original long communication link into two or more shorter links, and it will reduce the required transmission power of each node participating in the communication. Apparently, the decreasing transmission power could also lead to a lower interference level and shorter frequency reuse distance. With small interference, more users can be accepted in the system and the capacity is increased. Multi-hop Wireless Networks (MWNs) such as mobile ad-hoc, vehicular ad-hoc, multi-hop cellular, and wireless mesh networks have been emerging for enabling new applications and enhancing the network performance and deployment. In MWNs, the mobile nodes usually act as routers to relay others’ traffic to the destination. The network nodes usually commit with bandwidth, data storage, CPU cycles, battery power, etc, forming a pool of resources that can be shared by all of them. The utility of the nodes can also obtain from the pooled resources is much higher than that they can obtain on their own. Multi-hop packet relay can extend the communication range using limited transmit power because packets are transmitted over shorter distances. It also can improve the area of spectral efficiency and the network throughput and capacity However, due to the nature of wireless transmission and multi-hop packet relay, MWNs are vulnerable to serious security challenges that endanger their practical implementation. 1.2 Strategies for handling selfish behaviour in nodes Wireless mobile node are usually constrained by computation resources. The nodes which are not willing to forward packet and share the memory resources are called selfish nodes. Non cooperation behavior nodes can significantly adversely affect the entire networks. The selfish nodes do not satisfy neighbor nodes by giving required data to them. In an autonomous ad hoc network, each node is supply with a battery of limited power supply and may act as a service provider. To extend own life, a node may exhibit selfish behavior by benefiting from resources provided by other nodes, without, in return, making available resources of their own devices. Based on node behavior they divided into three they are,