Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1895489.1895541guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks

Published: 09 January 2002 Publication History

Abstract

Devices in mobile ad hoc networks work as network nodes and relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes cooperate in routing and forwarding. For individual nodes it might be advantageous not to cooperate, though. The new routing protocol extensions presented in this paper make it possible to detect and isolate misbehaving nodes, thus making it unattractive to deny cooperation. In the presented scheme, trust relationships and routing decisions are made based on experienced, observed, or reported routing and forwarding behavior of other nodes. A hybrid scheme of selective altruism and utilitarianism is presented to strengthen mobile ad hoc network protocols in their resistance to security attacks, while aiming at keeping network throughput, or goodput, high. This paper focuses particularly on the network layer, using the Dynamic Source Routing (DSR) protocol as an example.

References

[1]
R. Anderson and F. Stajano. The resurrecting duckling. Lecture Notes in Computer Science, Springer-Verlag, 1999.
[2]
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of IEEE Conference on Security and Privacy, Oakland, CA, 1996.
[3]
S. Buchegger and J.-Y. L. Boudec. IBM Research Report: The Selfish Node: Increasing Routing Security in Mobile Ad Hoc Networks. RR 3354, 2001.
[4]
L. Buttyan and J.-P. Hubaux. Enforcing service availability in mobile ad-hoc wans. MobiHOC, 2000.
[5]
R. Dawkins. The Selfish Gene. Oxford University Press, 1989 edition, 1976.
[6]
A. Fasbender, D. Kesdogan, and O. Kubitz. Variable and scalable security: Protection of loccation information in mobile IP. In Proceedings of the 46th IEEE Vehicular Technology Conference, Atlanta, pages 963-967, 1996.
[7]
Z. Haas. Securing ad hoc networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/December, pages 24-30, 1999.
[8]
J.-P. Hubaux, J.-Y. L. Boudec, S. Giordano, and M. Hamdi. The terminode project: Towards mobile ad hoc WANs. In Proceedings of MOMUC'99 San Diego, 1999.
[9]
D. B. Johnson and D. A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET)Working Group, IETF, October 1999.
[10]
J. Kleinberg. The small-world phenomenon: An algorithmic perspective. Cornell Computer Science Technical Report 99-1776, 1999.
[11]
MANET. http://www.ietf.org/html.charters/manetcharter. html, 2000.
[12]
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255-265, 2000.
[13]
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12):45-48, 2000.
[14]
B. Schneier. Secrets and Lies. Digital Security in a Networked World. John Wiley $ Sons, Inc, 1 edition, 2000.
[15]
B. R. Smith, S. Murthy, and J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pages 85-92, February 1997.
[16]
W. Stallings. Network and Internetwork Security. IEEE Press, 2 edition, 1995.
[17]
X. Zeng, R. Bagrodia, and M. Gerla. GloMoSim: A library for parallel simulation of large-scale wireless networks. Proceedings of the 12th Workshop on Parallel and Distributed Simulations-PADS '98, May 26-29, in Banff, Alberta, Canada, 1998.
[18]
P. Zimmerman. PGP user's guide, 1993.

Cited By

View all

Index Terms

  1. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        EUROMICRO-PDP'02: Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
        January 2002
        478 pages
        ISBN:0769514448

        Publisher

        IEEE Computer Society

        United States

        Publication History

        Published: 09 January 2002

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 26 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2017)Game Theory for Cyber Security and PrivacyACM Computing Surveys10.1145/305726850:2(1-37)Online publication date: 10-May-2017
        • (2017)Cronbach Alpha Reliability Factor Based Reputation Mechanism for Mitigating Byzantine Attack in MANETsWireless Personal Communications: An International Journal10.1007/s11277-017-4400-396:3(4525-4541)Online publication date: 1-Oct-2017
        • (2016)Perceptions and truthIEEE/ACM Transactions on Networking10.1109/TNET.2014.235976724:1(163-176)Online publication date: 1-Feb-2016
        • (2015)Secure Incentive-Based Architecture for Vehicular CloudProceedings of the 14th International Conference on Ad-hoc, Mobile, and Wireless Networks - Volume 914310.1007/978-3-319-19662-6_25(361-374)Online publication date: 29-Jun-2015
        • (2013)Trust assurance levels of cybercars in v2x communicationProceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles10.1145/2517968.2517974(49-60)Online publication date: 4-Nov-2013
        • (2011)Vehicular networks and the future of the mobile internetComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2010.10.01555:2(457-469)Online publication date: 1-Feb-2011
        • (2010)Adversarial securityProceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security10.5555/1966201.1966208(47-55)Online publication date: 5-Mar-2010
        • (2010)A cross-layer route discovery strategy for virtual currency systems in mobile ad hoc networksProceedings of the 7th international conference on Wireless on-demand network systems and services10.5555/1834182.1834201(91-98)Online publication date: 3-Feb-2010
        • (2010)A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networksInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2010.0309714:1(3-16)Online publication date: 1-Jan-2010
        • (2010)Rating the ratersProceedings of the 3rd international conference on Security of information and networks10.1145/1854099.1854116(71-80)Online publication date: 7-Sep-2010
        • Show More Cited By

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media