skip to main content
10.1145/1143549.1143688acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

Cooperation monitoring issues in ad hoc networks

Published: 03 July 2006 Publication History

Abstract

The network layer operations in ad hoc networks - namely packet routing and forwarding - are solely performed by the nodes themselves and consequently rely on the cooperation among them. In such networks, to best manage packet forwarding to the aimed destination node raises a need for continuous monitoring of the network service that is likely to be obtained from the other node cooperation. In this paper, we survey reputation mechanisms based on forwarding monitoring in ad hoc networks and we identify and analyze the relevant issues concerning the evaluation of forwarding operations. Finally, we highlight the need for transposing these results to hybrid ad hoc networks, with the aim to monitor the availability of the Internet access.

References

[1]
B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures, ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 2002
[2]
L. Buttyan and J. Hubaux, Nuglets: A virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report, EPFL, 2001
[3]
S. Buchegger and J. Le Boudec, Self-Policing Mobile Ad Hoc Networks by Reputation Systems, IEEE Communications Magazine, pp. 101--107, July 2005
[4]
S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255--265, 2000
[5]
C. Lavecchia, P. Michiardi, and R. Molva, Real Life Experience of Cooperation Enforcement Based on Reputation (CORE) for MANETs, REALMAN 05, July 2005
[6]
D. B. Johnson, D. A. Maltz, and Y. Hu, The Dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR), <draft-ietf-manet-dsr-10.txt>, expired 19 July 2004
[7]
P. Michiardi and R. Molva, CORE: A COllaborative Reputation Mechanism to enforce node cooperation in Mobile Ad Hoc Networks, in proceedings of the sixth IFIP conference on security communications and multimedia (CMS 2002), September 2002
[8]
S. Buchegger and J. Y. Le Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne, June 2002
[9]
Y. Rebahi, V. Mujica, C. Simons, and D. Sisalem, SAFE: Securing pAcket Forwarding in ad hoc nEtworks, 5th Workshop on Applications and Services in Wireless Networks, Paris, June/July 2005
[10]
Y. Rebahi, V. Mujica, D. Sisalem, A Reputation-Based Trust Mechanism for Ad hoc Networks, In Proceedings of 10th IEEE Symposium on Computers and Communications (ISCC 2005), Cartagena, June 2005
[11]
B. Venkatesan and V. Vijay, Designing Secure Wireless Mobile Ad Hoc Networks, 19th International Conference on Advanced Information Networking and Applications (AINA 2005), March 2005
[12]
F. Kargl, A. Klenk, M. Weber, and S. Schlott, Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks. 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004). August 2004
[13]
M. Conti, E. Gregori, and G. Maselli., Cooperation Issues in Mobile Ad Hoc Networks?24th International Conference on Distributed Computing Systems Workshops (ICDCSW 2004), vol. 06, no. 6, pp. 803--808, March 2004

Cited By

View all
  • (2021)A UAV-Assisted Ubiquitous Trust Communication System in 5G and Beyond NetworksIEEE Journal on Selected Areas in Communications10.1109/JSAC.2021.308867539:11(3444-3458)Online publication date: Nov-2021
  • (2010)A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networksProceedings of the 6th International Wireless Communications and Mobile Computing Conference10.1145/1815396.1815465(296-300)Online publication date: 28-Jun-2010
  • (2010)Effect of on/off misbehavior on overhearing based cooperation scheme for MANET2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE10.1109/MILCOM.2010.5680088(1086-1091)Online publication date: Oct-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computing
July 2006
2006 pages
ISBN:1595933069
DOI:10.1145/1143549
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 July 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad hoc network
  2. cooperation
  3. internetworking
  4. monitoring
  5. reputation

Qualifiers

  • Article

Conference

IWCMC06
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)A UAV-Assisted Ubiquitous Trust Communication System in 5G and Beyond NetworksIEEE Journal on Selected Areas in Communications10.1109/JSAC.2021.308867539:11(3444-3458)Online publication date: Nov-2021
  • (2010)A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networksProceedings of the 6th International Wireless Communications and Mobile Computing Conference10.1145/1815396.1815465(296-300)Online publication date: 28-Jun-2010
  • (2010)Effect of on/off misbehavior on overhearing based cooperation scheme for MANET2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE10.1109/MILCOM.2010.5680088(1086-1091)Online publication date: Oct-2010
  • (2010)Mobile Ad Hoc Network RoutingHandbook of Information and Communication Security10.1007/978-3-642-04117-4_21(407-420)Online publication date: 2010
  • (2009)Access point evaluation using packet transfer ratio in multihop wireless networksProceedings of the 23rd international conference on Information Networking10.5555/1699392.1699468(341-343)Online publication date: 21-Jan-2009
  • (2009) A review of trust modeling in ad hoc networks Internet Research10.1108/1066224091092784919:1(88-104)Online publication date: 30-Jan-2009
  • (2008)Using context information to evaluate cooperativenessProceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks10.1145/1454586.1454604(98-105)Online publication date: 27-Oct-2008
  • (2008)Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks2008 IEEE International Conference on Communications10.1109/ICC.2008.408(2129-2133)Online publication date: May-2008
  • (2007)Reputation-Based Routing in Hybrid Ad Hoc NetworksMobile Ad-Hoc and Sensor Networks10.1007/978-3-540-77024-4_11(101-112)Online publication date: 2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media