Skip to main content

Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

  • 949 Accesses

Abstract

Ad hoc network is a society of nodes who work in cooperative manner in accordance with self regulatory protocol. So reputation and trust should be built up and selfishness be dealt with a proper regulatory protocol. Selfish nodes are those which do not behave as the protocol specifies, with a wish to conserve power. This paper proposes an environmental compensation algorithm to the General Reputation Model. The algorithm provides a scheme as a mean to mitigate the detrimental effect of selfish nodes. And it deals for the first time with the security -the environment’s influence on nodes’ behavior. It also shows how to establish trusts in different areas with different environmental characteristics.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement)(IITA-2006-C1090-0603-0028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairnes. In Dynamic Ad-hoc NeTworks). In: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)

    Google Scholar 

  2. Michiardi, P., Molva, R.: Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121 (September 26-27, 2002)

    Google Scholar 

  3. Buchegger, S., Boudec, J.-Y.L.: Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, pp. 403–410. IEEE Computer Society, Los Alamitos (2002)

    Chapter  Google Scholar 

  4. Pirzada, A. A., McDonald, C.: Establishing trust in pure ad-hoc networks. ACM International Conference Proceeding Series, vol. 56. In: Proceedings of the 27th conference on Australasian computer science - vol. 26

    Google Scholar 

  5. Dewan, P., Dasgupta, P., Bhattacharya, A.: On Using Reputations in Ad hoc Networks to Counter Malicious Nodes. QoS and Dynamic Systems in conjunction with IEEE ICPADS Newport Beach, USA (2004)

    Google Scholar 

  6. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking MobiCom (2000)

    Google Scholar 

  7. IETF MANET Working Group Internet Drafts. http://www.ietf.org/ids.by.wg/manet.html

  8. Broch, J., Johnson, D.B., Maltz, D.A.: The dynamic source routing protocol for mobile ad hoc networks. Internet-Draft Version 03, IETF (October 1999)

    Google Scholar 

  9. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine, vol. 13(6)(November/ December 1999)

    Google Scholar 

  10. The Network Simulator - ns-2 (2002), http://www.isi.edu/nsnam/ns/

  11. The CMU Monarch Project. The CMU Monarch Projects Wireless and Mobility Extensions (October 12, 1999), http://www.monarch.cs.rice.edu/cmu-ns.html

  12. Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebays reputation system. In: Baye, M. (ed.) Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce, vol. 11, pp. 127–C157. Elsevier Science Ltd, Amsterdam (November 2002)

    Chapter  Google Scholar 

  13. Mui, L., Mohtashemi, M., Halberstadt, A.: Notions of reputation in multi-agents systems: a review. In: Gini, M., Ishida, T., Castelfranchi, C., Johnson, W. (eds.) Proceedings of the first international joint conference on Autonomous agents and multiagent systems, Bologna, Italy, July 15-C19, 2002, ACM Press, New York (2002)

    Google Scholar 

  14. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lei, Z., Nyang, D., Lee, K., Lim, H. (2007). Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics