Enhancing nodes cooperation in ad hoc networks

Ad hoc networks are distributed, self-organized wireless networks. By their nature, it is easy for a malicious user to enter this kind of networks with the intention of disturbing the way they are behaving by not participating to the network. This kind of behavior is a form of selfishness where nodes want to save their energy by not routing packets. Many solutions based on virtual currency mechanisms or on reputation mechanisms have been shown to increase the networks reliability for this kind of problems. We advocate in this paper that this issue can be treated with local algorithms that have minor drawbacks compared to sophisticated solutions developed in other works. We conduct an evaluation of our solution, which shows satisfying enough results to be used in civilian spontaneous networks

[1]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[3]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[4]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[5]  Yanbin Liu,et al.  Reputation propagation and agreement in mobile ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[6]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[9]  Ioanis Nikolaidis,et al.  Certain limitations of reputation--based schemes in mobile environments , 2005, MSWiM '05.

[10]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[11]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[12]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.