Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Trust Approach for Node Cooperation in MANET

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

  • 1088 Accesses

Abstract

In MANET, Node misbehavior due to selfish or malicious reasons can significantly degrade the performance of ad hoc networks. To cope with misbehavior in such self-organized networks, an incentive mechanism must be in place. In this study, a trust-based incentive model on a self-policing mechanism is proposed to make collaboration rational for selfish/malicious nodes. This trust system makes them evaluate the trust of their neighbor locally to mitigate contamination by direct observation and the use of second-hand information available. In our approach, every node maintains a trust rating about every node else they care about. Meanwhile, trust fading and redemption are brought about by update and re-establishment of the trust to show robustness. Performance by simulation reveals that in the case of existing malicious nodes, Dynamic Source Routing (DSR) with proposed trust-based node incentive mechanism performs better than DSR in terms of packet successful delivery ratio and mean number of packets dropped.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. David, R., Ignas, G.N.: Ad Hoc networking in future wireless communications. Computer Communications 26, 36–40 (2003)

    Article  Google Scholar 

  2. Marti, S., Giuli, T.J., Lai, K.: Mitigating routing misbehavior in mobile MANET networks. In: 6th International Conference of Mobile Computer Networks, Boston, MA, pp. 255–265 (2000)

    Google Scholar 

  3. Buchegger, S., Le Boudec, J.Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes-Fairness in Dynamic Ad-Hoc NeTworks). In: 3rd ACM International Symposium of Mobile MANET Networking and Computing, pp. 80–91 (2002)

    Google Scholar 

  4. Fudenbery, D., Tirole, J.: Game Theory. Cambridge, MA (1991)

    Google Scholar 

  5. Rapaport, A., Chammah, A.M.: The Prisoner’s Dilemma: A study in conflict and cooperation. University of Michigan Press, Ann Arbor, MI (1965)

    Google Scholar 

  6. Michiardi, P., Molva, R.: Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: IFIP - Communication and Multimedia Security Conference, pp.107–121 (2002)

    Google Scholar 

  7. Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized MANET networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)

    Google Scholar 

  8. Jakobsson, M., Hubaux, J.P., Buttyan, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In: 7th International Financial Cryptography Conference, Berlin, Germany, pp. 15–33 (2003)

    Google Scholar 

  9. Zhong, S., Chen, J., Yan, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: IEEE Conference on Computer Communications, San Francisco, CA, pp. 1987–1997 (2003)

    Google Scholar 

  10. Lamparter, B., Paul, K., Westhoff, D.: Charging Support for MANET Stub Networks. Computer Communications 26, 1504–1514 (2003)

    Article  Google Scholar 

  11. Buchegger, S., Le Boudec, J.Y.: A Robust Reputation System for Peer-to-Peer and Mobile Ad Hoc Networks. In: 2nd Workshop on the Economics of Peer-to-Peer Systems, Harvard Univ., Cambridge, MA (2004)

    Google Scholar 

  12. Mohit, V., Murtuza, J., Madhusudhanan, C.: Quantifying Trust in Mobile Ad-Hoc Networks. In: IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems, Waltham, MA, USA, pp. 65–70 (2005)

    Google Scholar 

  13. Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax VA, pp. 135–147 (2003)

    Google Scholar 

  14. The weighted average definition, http://www.mathwords.com/w/weighted_average.htm

  15. The Vint Project. The ns-2 network simulator, http://www.isi.edu/nanam/ns

  16. Buchegger, S., Le Boudec, J.Y.: Self-policing Mobile Ad Hoc Networks by Reputation Systems. IEEE Communications, 101–107 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, K., Wu, M. (2007). A Trust Approach for Node Cooperation in MANET. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics