Title :
On using reputations in ad hoc networks to counter malicious nodes
Author :
Dewan, Prashant ; Dasgupta, Partha ; Bhattacharya, Amiya
Author_Institution :
Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
Abstract :
Nodes in mobile ad hoc networks have a limited transmission range. Hence the nodes expect their neighbors to relay packets meant for far off destinations. These networks are based on the fundamental assumption that if a node promises to relay a packet, it relays it and does not cheat. This assumption becomes invalid when the nodes in the network have tangential or contradictory goals. The reputations of the nodes, based on their past history of relaying packets, can be used by their neighbors to ensure that the packet is relayed by the node. This paper introduces a reputation scheme for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses a path whose next hop node has the highest reputation. This policy, when used recursively, in the presence of 40% malicious nodes, improves the throughput of the system to 65%, from 22 % throughput provided by AODV. This improvement is obtained at the cost of a higher number of route discoveries with a minimal increase in the average hop length according S. Bansal and M. Baker (2003).
Keywords :
ad hoc networks; frame relay; mobile computing; security of data; telecommunication network routing; AODV; ad hoc networks; hop node; malicious nodes; mobile networks; packets relaying; Ad hoc networks; Computer science; Costs; Counting circuits; History; Intelligent networks; Mobile ad hoc networks; Relays; Routing protocols; Throughput;
Conference_Titel :
Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on
Print_ISBN :
0-7695-2152-5
DOI :
10.1109/ICPADS.2004.1316153