skip to main content
article

Overcoming misbehavior in mobile ad hoc networks: an overview

Published: 01 August 2005 Publication History
First page of PDF

References

[1]
19-1 Anderegg, L., and Eidenbenz, S. (2003). Ad hoc-VCG:A Truthful and Cost-Efficient Routing Protocol for Mobile Ad hoc Networks With Selfish Agents. In Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom'03), San Diego, CA.
[2]
6-2 Bansal, S., and Baker, M. (2003). Observation-based cooperation enforcement in ad hoc networks. Technical Report.
[3]
9-3 Buchegger, S., and Le Boudec, J. Y. (2002). Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks," In Proceedings of 10th Euromicro PDP (Parallel, Distributed and Network-based Processing)", Gran Canaria, 403-410.
[4]
8-4 Buchegger, S., and Le Boudec, J.-Y. (2003). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, 226-236.
[5]
15-5 Buttyan, L., and Hubaux, J.-P. (2000). Enforcing service availability in mobile ad-hoc wans. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA.
[6]
14-6 Buttyan, L., and Hubaux, J.-P. (2001). Stimulating cooperation in self-organizing mobile ad hoc networks. Technical Report DSC/2001/046, EPFLDI-ICA.
[7]
2-7 Cardenas, A. A., Radosavac, S., and Baras, J. S. (2004). Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks. Technical Report.
[8]
18-8 Fratkin, E., Vijayaraghavan, V., Liu, Y., Gutierrez, D., Li, T.M., and Baker, M. Participation Incentives for Ad Hoc Networks, 〈http://www.stanford.edu/yl314/ape/paper.ps〉.
[9]
12-9 Huang, Y., Fan, W, Lee, W., and Yu, P. S. (2003). Cross-feature analysis for detecting ad hoc routing anomalies. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003).
[10]
4-10 Johnson, D. B., and Maltz, D. A. (2003). The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, Version 9.
[11]
3-11 Kyasanur, P., and Vaidya, N. (2003). Detection and handling of mac layer misbehavior in wireless networks. In Proceedings of the International Conference on Dependable Systems and Networks.
[12]
1-12 L. M. S. C. of the IEEE Computer Society. (1999). Wireless LAN medium access control (MAC) and physical layer (phy) specifications. IEEE Standard 802.11, 1999 Edition.
[13]
5-13 Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, 255-265.
[14]
20-14 Maxim Raya, J.-P. H., and Aad, I. (2004). Domino: A system to detect greedy behavior in ieee 802.11 hotspots. In Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services (MobiSys2004), Boston, MA.
[15]
7-15 Michiardi, P., and Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP Conference on Security Communications, and Multimedia (CMS 2002), Portoroz, Slovenia.
[16]
10-16 Miranda, H. and Rodrigues, L. (2003). Preventing selfishness in open mobile ad hoc networks. In Proceedings of the International Workshop on Mobile Distributed Computing (MDC), Providence, RI, 440-445.
[17]
11-17 Paul, K, and Westhoff, D. (2002). Context aware inferencing to rate a selfish node in dsr based ad-hoc networks. In Proceedings of the IEEE Globecom Conference, Taipeh, Taiwan.
[18]
17-18 Raghavan, B., and Snoeren, A. C. (2003). Priority forwarding in ad hoc networks with self-interested parties. Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA.
[19]
13-19 Zhang, Y., and Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of MOBICOM 2000, 275-283.
[20]
16-20 Zhong, S., Yang, Y., and Chen, J. (2003). Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. Proceedings of Infocom.

Cited By

View all
  • (2009)Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops10.1109/WOWMOM.2009.5282475(1-8)Online publication date: Jun-2009
  • (2008)Improving Wireless Health Monitoring Using Incentive-Based Router CooperationComputer10.1109/MC.2008.15741:5(56-62)Online publication date: 1-May-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image XRDS: Crossroads, The ACM Magazine for Students
XRDS: Crossroads, The ACM Magazine for Students  Volume 11, Issue 4
August 2005
70 pages
ISSN:1528-4972
EISSN:1528-4980
DOI:10.1145/1144389
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2005
Published in XRDS Volume 11, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2009)Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops10.1109/WOWMOM.2009.5282475(1-8)Online publication date: Jun-2009
  • (2008)Improving Wireless Health Monitoring Using Incentive-Based Router CooperationComputer10.1109/MC.2008.15741:5(56-62)Online publication date: 1-May-2008

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media