DocumentCode
3216441
Title
On using reputations in ad hoc networks to counter malicious nodes
Author
Dewan, Prashant ; Dasgupta, Partha ; Bhattacharya, Amiya
Author_Institution
Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
fYear
2004
fDate
7-9 July 2004
Firstpage
665
Lastpage
672
Abstract
Nodes in mobile ad hoc networks have a limited transmission range. Hence the nodes expect their neighbors to relay packets meant for far off destinations. These networks are based on the fundamental assumption that if a node promises to relay a packet, it relays it and does not cheat. This assumption becomes invalid when the nodes in the network have tangential or contradictory goals. The reputations of the nodes, based on their past history of relaying packets, can be used by their neighbors to ensure that the packet is relayed by the node. This paper introduces a reputation scheme for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses a path whose next hop node has the highest reputation. This policy, when used recursively, in the presence of 40% malicious nodes, improves the throughput of the system to 65%, from 22 % throughput provided by AODV. This improvement is obtained at the cost of a higher number of route discoveries with a minimal increase in the average hop length according S. Bansal and M. Baker (2003).
Keywords
ad hoc networks; frame relay; mobile computing; security of data; telecommunication network routing; AODV; ad hoc networks; hop node; malicious nodes; mobile networks; packets relaying; Ad hoc networks; Computer science; Costs; Counting circuits; History; Intelligent networks; Mobile ad hoc networks; Relays; Routing protocols; Throughput;
fLanguage
English
Publisher
ieee
Conference_Titel
Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on
ISSN
1521-9097
Print_ISBN
0-7695-2152-5
Type
conf
DOI
10.1109/ICPADS.2004.1316153
Filename
1316153
Link To Document