Abstract
Ad hoc network is a society of nodes who work in cooperative manner in accordance with self regulatory protocol. So reputation and trust should be built up and selfishness be dealt with a proper regulatory protocol. Selfish nodes are those which do not behave as the protocol specifies, with a wish to conserve power. This paper proposes an environmental compensation algorithm to the General Reputation Model. The algorithm provides a scheme as a mean to mitigate the detrimental effect of selfish nodes. And it deals for the first time with the security -the environment’s influence on nodes’ behavior. It also shows how to establish trusts in different areas with different environmental characteristics.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement)(IITA-2006-C1090-0603-0028).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairnes. In Dynamic Ad-hoc NeTworks). In: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)
Michiardi, P., Molva, R.: Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121 (September 26-27, 2002)
Buchegger, S., Boudec, J.-Y.L.: Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, pp. 403–410. IEEE Computer Society, Los Alamitos (2002)
Pirzada, A. A., McDonald, C.: Establishing trust in pure ad-hoc networks. ACM International Conference Proceeding Series, vol. 56. In: Proceedings of the 27th conference on Australasian computer science - vol. 26
Dewan, P., Dasgupta, P., Bhattacharya, A.: On Using Reputations in Ad hoc Networks to Counter Malicious Nodes. QoS and Dynamic Systems in conjunction with IEEE ICPADS Newport Beach, USA (2004)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking MobiCom (2000)
IETF MANET Working Group Internet Drafts. http://www.ietf.org/ids.by.wg/manet.html
Broch, J., Johnson, D.B., Maltz, D.A.: The dynamic source routing protocol for mobile ad hoc networks. Internet-Draft Version 03, IETF (October 1999)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine, vol. 13(6)(November/ December 1999)
The Network Simulator - ns-2 (2002), http://www.isi.edu/nsnam/ns/
The CMU Monarch Project. The CMU Monarch Projects Wireless and Mobility Extensions (October 12, 1999), http://www.monarch.cs.rice.edu/cmu-ns.html
Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebays reputation system. In: Baye, M. (ed.) Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce, vol. 11, pp. 127–C157. Elsevier Science Ltd, Amsterdam (November 2002)
Mui, L., Mohtashemi, M., Halberstadt, A.: Notions of reputation in multi-agents systems: a review. In: Gini, M., Ishida, T., Castelfranchi, C., Johnson, W. (eds.) Proceedings of the first international joint conference on Autonomous agents and multiagent systems, Bologna, Italy, July 15-C19, 2002, ACM Press, New York (2002)
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lei, Z., Nyang, D., Lee, K., Lim, H. (2007). Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_71
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_71
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)