Reputation methods for routing security for mobile ad hoc networks

Abstract

Mobileadhocnetworkshaveinherentlyverydi#erentpropertiestoconventionalnetworks. Thesenewcharacteristics presentmajorsecurityvulnerabilities;inparticular,oneside e#ectoftheuniquewayinwhichroutingprotocolsoperate inadhocnetworksisthatmanynewthreatsarise.Selfishnodesarethosewhichdonotperformcertainopera - tionsthattheprotocolspecifiesthattheyshould,througha wishtoconservepower.Maliciousnodesmaydeliberately disruptthenetworkusingavarietyofattacks.Thispaper discussesreputationmechanismswhichhavebeensuggested asameanstomitigatethedetrimentale#ectofselfishand maliciousnodes.Thispaperrevealsreasonswhycomplex reputationsystemsmaybetooine#cienttouseinamobileadhocnetwork, whereresourcesarelimited.However, suggestionsarealsomadetoshowhowasimplereputation systemmightbeusedtoenhancetherobustnessofadhoc networks

    Similar works

    Available Versions