Abstract
Instant deployment without relying on an existing infrastructure makes mobile ad hoc networks (MANETs) an attractive choice for many dynamic situations. However, such flexibility comes with a consequence – these networks are much more vulnerable to attacks. Authentication and encryption are traditional protection mechanisms, yet they are ineffective against attacks such as selfish nodes and malicious packet dropping. Recently, reputation systems have been proposed to enforce cooperation among nodes. These systems have provided useful countermeasures and have been successful in dealing with selfish and malicious nodes. This chapter presents a survey of the major contributions in this field. We also discuss the limitations of these approaches and suggest possible solutions and future directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Hu, M. Burmester: LARS: a locally aware reputation system for mobile ad hoc networks, Proc. of the 44th ACM Annual Southeast Regional Conf., Melbourne (2006) pp. 119–123
J.V. Merwe, D. Dawoud, S. McDonald: A survey on peer-to-peer key management for mobile ad hoc networks, ACM Comput. Surv. 39, 1 (2007)
E. Royer, C. Toh: A review of current routing protocols for ad hoc mobile wireless networks, IEEE Pers. Commun. 6(2), 46–55 (1999)
K. Lai, M. Baker, S. Marti, T. Giuli: Mitigating routing misbehavior in mobile ad hoc networks, Proc. Annual ACM Int. Conf. on Mobile Computing and Networking (MobiCom), Boston (2005) pp. 255–265
P. Michiardi, R. Molva: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, IFIP Conf. Proc., Vol. 228, ed. by B. Jerman-Blažıč, T. Klobučar (B.V., Deventer 2002) pp. 107–121
S. Bansal, M. Baker: Observation-based cooperation enforcement in ad hoc networks, technical report CS/0307012 (Stanford University, 2003)
Q. He, D. Wu, P. Khosla: SORI: a secure and objective reputation-based incentive scheme for ad hoc networks, Proc. IEEE Wireless Communications and Networking Conf. (WCNC 2004), Atlanta (2004)
D. Johnson, Y. Hu, D. Martz: The dynamic source routing protocol (DSR) for mobile ad hoc Networks for IPv4, RFC 4728, Internet Task Engineering Force (IETF) (2007)
R. Carruthers, I. Nikolaidis: Certain limitations of reputation-based schemes in mobile environments, Proc. of the 8th ACM Int. Symp. on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Montréal (2005) pp. 2–11
S. Buchegger, J. Le Boudec: Performance analysis of the CONFIDANT protocol, Proc. of the 3rd ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne (2002)
S. Buchegger, J. Y. Le Boudec: A robust reputation system for mobile ad hoc networks, EPFL IC_Tech_Report_200350 (2003)
X. Li, M.R. Lyu, J. Liu: A trust model based routing protocol for secure ad hoc networks, Proc. of the IEEE Aerospace Conf. (2004) pp. 1286–1295
Y. Rebahi, V. Mujica, C. Simons, D. Sisalem: SAFE: Securing pAcket Forwarding in ad hoc nEtworks, of 5th Workshop on Applications and Services in Wireless Networks (2005)
T. Anker, D. Dolev, B. Hod: Cooperative and reliable packet forwarding on top of AODV, Proc. of the 4th Int. Symp. on Modeling and Optimization in Mobile, Ad-hoc, and Wireless Networks, Boston (2006) pp. 1–10
C. Perkins, D. Belding-Royer, S. Das: Ad hoc on-demand distance vector (AODV) routing, RFC 3561, Internet Engineering Task Force (2003)
J. Doucer: The sybil attack, 1st Int. Workshop on Peer-to-Peer Systems (IPTPS’02) (2002)
S. Laniepce, J. Demerjian, A. Mokhtari: Cooperation monitoring issues in ad hoc networks, Proc. of the Int. Conf. on Wireless Communications and Mobile Computing (2006) pp. 695–700
J. Li, T.-S. Moh, M. Moh: Path-based reputation system for MANET routing, accepted to present at the 7th Int. Conf. on Wired/Wireless Internet Communications (WWIC), to be held in Enschede (2009)
N. Haghpanah, M. Akhoondi, M. Kargar, A. Movaghar: Trusted secure routing for ad hoc networks, Proc. of the 5th ACM Int. Workshop on Mobility Management and Wireless Access (MobiWac ’07), Chania, Crete Island (2007) pp. 176–179
Y. Zhang, W. Lou, W. Liu, Y. Fang: A secure incentive protocol for mobile ad hoc networks, Wirel. Netw. 13(5), 569–582 (2007)
J. Mundinger, J. Le Boudec: Reputation in self-organized communication systems and beyond, Proc. of the 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer and Communications Systems (Interperf ’06), Pisa (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Moh, M., Li, J. (2010). Mobile Ad Hoc Network Routing. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)