Skip to main content

Trust Mechanisms and Reputation Systems

  • Chapter

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4621))

Abstract

Most of the approaches for ad hoc networks assume that the nodes readily and honestly follow the protocol. Unfortunately, this assumption does not always hold in reality. Misbehaving in ad hoc networks can take place at different levels of the system architecture:

  1. 1

    On the communication level, nodes can refuse to forward messages of others in order to save bandwidth and energy. Many misbehaving nodes would lead to a low reliability of the system. But such nodes can be detected, because every node can eavesdrop the network traffic of adjacent nodes ([279], ’Watchdog’). Most of the research on reputation and trust models in ad hoc networks focus on that issue.

  2. 1

    In contrast, misbehavior on the application level covers spoof query results and valueless services from nodes that would be able to provide high-quality ones. It is challenging to automatically detect this kind of adverse behavior. Typically it is the end-user who recognizes that a service provided by a certain node does not meet its expectations. But it is very important for open ad hoc networks to detect and expel such nodes. Otherwise, the system can become suspicious, and the users can loose their motivation to participate in the system [317].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Dorothea Wagner Roger Wattenhofer

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, E. (2007). Trust Mechanisms and Reputation Systems. In: Wagner, D., Wattenhofer, R. (eds) Algorithms for Sensor and Ad Hoc Networks. Lecture Notes in Computer Science, vol 4621. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74991-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74991-2_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74990-5

  • Online ISBN: 978-3-540-74991-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics