Reputation methods for routing security for mobile ad hoc networks

被引:19
作者
Yau, PW [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Mobile VCE Res Grp, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
SYMPOTIC'03: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS | 2003年
关键词
routing protocols; network security; mobile networks;
D O I
10.1109/TIC.2003.1249106
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. Malicious nodes may deliberately disrupt the network using a variety of attacks. This paper discusses reputation mechanisms which have been suggested as a means to mitigate the detrimental effect of selfish and malicious nodes. This paper reveals reasons why complex reputation systems may be too inefficient to use in a mobile ad hoc network, where resources are limited. However, suggestions are also made to show how a simple reputation system might be used to enhance the robustness of ad hoc networks.
引用
收藏
页码:130 / 137
页数:8
相关论文
共 9 条
[1]  
Buchegger S., 2002, P 3 ACM INT S MOB AD, P226
[2]  
Dellarocas C., 2000, EC'00. Proceedings of the 2nd ACM Conference on Electronic Commerce, P150, DOI 10.1145/352871.352889
[3]   The social cost of cheap pseudonyms [J].
Friedman, EJ ;
Resnick, P .
JOURNAL OF ECONOMICS & MANAGEMENT STRATEGY, 2001, 10 (02) :173-199
[4]  
Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955
[5]  
Michiardi P, 2002, INT FED INFO PROC, V100, P107
[6]  
MUI L, 2002, P 1 INT JOINT C AUT, P280
[7]   Reputation systems [J].
Resnick, P ;
Zeckhauser, R ;
Friedman, E ;
Kuwabara, K .
COMMUNICATIONS OF THE ACM, 2000, 43 (12) :45-48
[8]  
Resnick P, 2002, ADV APP M-E, V11, P127
[9]  
Yau P.- W., 2003, Proceedings of the 7th International Symposium on Communication Theory and Applications (ISCTA), P99