Skip to main content

Abstract

Instant deployment without relying on an existing infrastructure makes mobile ad hoc networks (MANETs) an attractive choice for many dynamic situations. However, such flexibility comes with a consequence – these networks are much more vulnerable to attacks. Authentication and encryption are traditional protection mechanisms, yet they are ineffective against attacks such as selfish nodes and malicious packet dropping. Recently, reputation systems have been proposed to enforce cooperation among nodes. These systems have provided useful countermeasures and have been successful in dealing with selfish and malicious nodes. This chapter presents a survey of the major contributions in this field. We also discuss the limitations of these approaches and suggest possible solutions and future directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Hu, M. Burmester: LARS: a locally aware reputation system for mobile ad hoc networks, Proc. of the 44th ACM Annual Southeast Regional Conf., Melbourne (2006) pp. 119–123

    Google Scholar 

  2. J.V. Merwe, D. Dawoud, S. McDonald: A survey on peer-to-peer key management for mobile ad hoc networks, ACM Comput. Surv. 39, 1 (2007)

    Article  Google Scholar 

  3. E. Royer, C. Toh: A review of current routing protocols for ad hoc mobile wireless networks, IEEE Pers. Commun. 6(2), 46–55 (1999)

    Article  Google Scholar 

  4. K. Lai, M. Baker, S. Marti, T. Giuli: Mitigating routing misbehavior in mobile ad hoc networks, Proc. Annual ACM Int. Conf. on Mobile Computing and Networking (MobiCom), Boston (2005) pp. 255–265

    Google Scholar 

  5. P. Michiardi, R. Molva: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP Tc6/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, IFIP Conf. Proc., Vol. 228, ed. by B. Jerman-Blažıč, T. Klobučar (B.V., Deventer 2002) pp. 107–121

    Google Scholar 

  6. S. Bansal, M. Baker: Observation-based cooperation enforcement in ad hoc networks, technical report CS/0307012 (Stanford University, 2003)

    Google Scholar 

  7. Q. He, D. Wu, P. Khosla: SORI: a secure and objective reputation-based incentive scheme for ad hoc networks, Proc. IEEE Wireless Communications and Networking Conf. (WCNC 2004), Atlanta (2004)

    Google Scholar 

  8. D. Johnson, Y. Hu, D. Martz: The dynamic source routing protocol (DSR) for mobile ad hoc Networks for IPv4, RFC 4728, Internet Task Engineering Force (IETF) (2007)

    Google Scholar 

  9. R. Carruthers, I. Nikolaidis: Certain limitations of reputation-based schemes in mobile environments, Proc. of the 8th ACM Int. Symp. on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Montréal (2005) pp. 2–11

    Google Scholar 

  10. S. Buchegger, J. Le Boudec: Performance analysis of the CONFIDANT protocol, Proc. of the 3rd ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne (2002)

    Google Scholar 

  11. S. Buchegger, J. Y. Le Boudec: A robust reputation system for mobile ad hoc networks, EPFL IC_Tech_Report_200350 (2003)

    Google Scholar 

  12. X. Li, M.R. Lyu, J. Liu: A trust model based routing protocol for secure ad hoc networks, Proc. of the IEEE Aerospace Conf. (2004) pp. 1286–1295

    Google Scholar 

  13. Y. Rebahi, V. Mujica, C. Simons, D. Sisalem: SAFE: Securing pAcket Forwarding in ad hoc nEtworks, of 5th Workshop on Applications and Services in Wireless Networks (2005)

    Google Scholar 

  14. T. Anker, D. Dolev, B. Hod: Cooperative and reliable packet forwarding on top of AODV, Proc. of the 4th Int. Symp. on Modeling and Optimization in Mobile, Ad-hoc, and Wireless Networks, Boston (2006) pp. 1–10

    Google Scholar 

  15. C. Perkins, D. Belding-Royer, S. Das: Ad hoc on-demand distance vector (AODV) routing, RFC 3561, Internet Engineering Task Force (2003)

    Google Scholar 

  16. J. Doucer: The sybil attack, 1st Int. Workshop on Peer-to-Peer Systems (IPTPS’02) (2002)

    Google Scholar 

  17. S. Laniepce, J. Demerjian, A. Mokhtari: Cooperation monitoring issues in ad hoc networks, Proc. of the Int. Conf. on Wireless Communications and Mobile Computing (2006) pp. 695–700

    Google Scholar 

  18. J. Li, T.-S. Moh, M. Moh: Path-based reputation system for MANET routing, accepted to present at the 7th Int. Conf. on Wired/Wireless Internet Communications (WWIC), to be held in Enschede (2009)

    Google Scholar 

  19. N. Haghpanah, M. Akhoondi, M. Kargar, A. Movaghar: Trusted secure routing for ad hoc networks, Proc. of the 5th ACM Int. Workshop on Mobility Management and Wireless Access (MobiWac ’07), Chania, Crete Island (2007) pp. 176–179

    Google Scholar 

  20. Y. Zhang, W. Lou, W. Liu, Y. Fang: A secure incentive protocol for mobile ad hoc networks, Wirel. Netw. 13(5), 569–582 (2007)

    Article  Google Scholar 

  21. J. Mundinger, J. Le Boudec: Reputation in self-organized communication systems and beyond, Proc. of the 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer and Communications Systems (Interperf ’06), Pisa (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Moh, M., Li, J. (2010). Mobile Ad Hoc Network Routing. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics