Cooperation in Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no fixed infrastructure [1, 2]. Cooperation among nodes is fundamental to the function of a MANET. However, nodes in a MANET are autonomous and independent wireless devices. Due to the lack of infrastructure, the constraints of resources at each node, and the ad hoc nature of nodes, we cannot assume that every node behaves as the protocol requires. This chapter presents a detailed study on the recent advances in stimulating cooperation in MANETs. Virtual currency systems and reputation systems are described, followed by a discussion of the directions for future research.

[1]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[2]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[5]  Chris J. Mitchell,et al.  Security Vulnerabilities in Ad Hoc Networks , 2003 .

[6]  Ivan Stojmenovic,et al.  Ad hoc networks security , 2004 .

[7]  S. Buchegger,et al.  Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[8]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[9]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.

[10]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[13]  Mario Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .

[14]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[17]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[18]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[19]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[21]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[22]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[23]  Mukesh Singhal,et al.  A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks , 2004, ADHOC-NOW.

[24]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[25]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[26]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[27]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[28]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[29]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[30]  Levente Buttyán,et al.  Towards mobile ad-hoc WANs: terminodes , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[31]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[32]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[33]  Pietro Michiardi,et al.  Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .

[34]  Marco Conti,et al.  Cooperation issues in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[35]  Markus Jakobsson,et al.  A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.

[36]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[37]  BhagwatPravin,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994 .

[38]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[39]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[40]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[41]  Yuan Ning Securing AD-HOC networks using IPSec , 2006 .

[42]  Hugo M. Miranda Preventing selfishness in open mobile ad hoc networks , 2002 .