A Reputation-Based Trust Mechanism for Ad Hoc Networks
- 1 January 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities for this emerging networking paradigm. Usually, security in ad hoc networks is handled through authentication and encryption. This can be considered as a first line of defense, however, this remain inefficient against some other kind of attacks such as malicious packet dropping. The purpose of this work is to provide a mechanism for detecting malicious incorrect packet forwarding attacks. To this end, a trust model extending routing protocols and based on the reputation concept is developed. Our model provides two main functionalities: monitoring the behavior of the neighboring nodes in the network and computing their reputations based on the information provided by the monitoring. This paper also discusses how the reputation information is gathered, stored and exchanged between the nodes, and computed according to the different scenarios. Our mechanism is also validated with some simulation work showing its feasibility, performance and benefitsKeywords
This publication has 6 references indexed in Scilit:
- The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4Published by RFC Editor ,2007
- Trusting routers and relays in ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A cooperative intrusion detection system for ad hoc networksPublished by Association for Computing Machinery (ACM) ,2003
- Performance comparison of two on-demand routing protocols for ad hoc networksIEEE Wireless Communications, 2001
- A performance comparison of multi-hop wireless ad hoc network routing protocolsPublished by Association for Computing Machinery (ACM) ,1998
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987