A survey of several cooperation enforcement schemes for MANETs

The employment of adequate trust methods in mobile ad hoc networks (MANET) has been receiving increasing attention during the last few years, and several trust and security establishment solutions that rely on cryptographic schemes have been proposed. These schemes, although effective, produce significant processing and communication overheads and consume energy, and, hence, they do not take into account the idiosyncrasies of a MANET. More recently, cooperation enforcement methods have been proposed for trust establishment in MANET. These schemes are considered suitable for ad-hoc networks, where key or certificate distribution centers are absent or ephemerally present. Cooperation enforcement methods do not provide strong authentication of entities. Instead, they contribute to the identification of the trustworthiness of peers. This paper surveys the most important cooperation enforcement methods that have been introduced, providing a comprehensive comparison between the different proposed schemes

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[3]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[4]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[5]  Stephan Eidenbenz,et al.  Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents , 2003, MobiCom '03.

[6]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[7]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[9]  Partha Dasgupta,et al.  On using reputations in ad hoc networks to counter malicious nodes , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..

[10]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[11]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[12]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[13]  Dirk Westhoff,et al.  Estimating the value of co-operation approaches for multi-hop ad hoc networks , 2005, Ad Hoc Networks.