Abstract
Nodes in mobile ad hoc networks often need the help of others in order to have their packets delivered to their destination. However, nodes may not be governed by a single authority and need not share a common goal. Thus, a selfish node may prefer to save resources for its own communication, rather than to forward packets for other nodes. We suggest to collect information about the forwarding of packets in the network in a decentralized manner. Through reception of acknowledgments, a node can update a local repository, on which the node can rely to judge the behavior of the other nodes. We define a secure structure for the acknowledgments and the rules for updating the local repository. Also, we discuss a solution to achieve a univocal identification of a node in MANET environments.
Work partially supported by the MIUR project: “Strumenti, Ambienti e Applicazioni Innovative per la Società dell'Informazione”, sottoprogetto SP1: Reti INTERNET: “efficienza, integrazione e sicurezza”; by the CSP project: SeTAPS II; by the Quality of Protection (QoP) project: CREATE-NET.
Chapter PDF
Similar content being viewed by others
References
Balfanz, D., Smetters, D., Stewart, P., and Wong, H. C. (2002). Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Proc. of NDSS'02. The Internet Society.
Buchegger, S. and Boudec, J. L. (2002). Performance Analysis of the CONFIDANT Protocol. Cooperation Of Nodes — Fairness In Dynamic Ad-hoc Networks. In Proc. of ACM MobiHoc'02.
Buttyan, L. and Hubaux, J. (2002). Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications (MONET), 8(5).
Gennaro, R. and Rohatgi, P. (2001). How to Sign Digital Streams. Information and Computation, 165(1): 100–116.
Hu, Y., Perrig, A., and Johnson, D. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002).
Johnson, D., Maltz, D., and Broch, J. (Addison-Wesley, 2001). DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Ad Hoc Networking, chapter 5, pages 139–172.
Jong-Wook, P. and Polk, T. (Internet Draft, October 2003). Internet X.509 Public Key Infrastructure Subject Identification Method SIM.
Lamparter, B., Plaggemeier, M., and Westhoff, D. (2003). About the Impact of Co-operation Approaches for Ad Hoc Networks. In Proc. of ACM MobiHoc'03.
Marti, S., Giuli, T., Lai, K., and Baker, M. (2000). Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proc. of MobiCom'00, pages 255–265. ACM.
Michiardi, P. and Molva, R. (2002a). Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In Proc. of CMS'02.
Michiardi, P. and Molva, R. (2002b). Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. In Proc. of European Wireless'02.
Michiardi, P. and Molva, R. (2003). A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks. In Proc. of WiOpt'03.
of the IEEE Computer Society, L. M. S. C. (1999). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. In IEEE Standard 802.11, 1999 Edition.
Pinkas, D. and Gindin, T. (Internet Draft, January 2004). Internet X.509 Public Key Infrastructure Permanent Identifier.
Salem, N. B., Buttyan, L., Hubaux, J., and Jakobsson, M. (2003). A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks. In Proc. of ACM MobiHoc'03.
Stajano, F. and Anderson, R. (1999). The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In Proc. of 7th Security Protocols Workshop, volume LNCS 1796, pages 172–194.
Urpi, A., Bonuccelli, M., and Giordano, S. (2003). Modelling Cooperation in Mobile Ad-hoc Networks: a Formal Description of Selfishness. In Proc. of WiOpt'03.
Zhong, S., Chen, J., and Yang, Y. (2003). Sprite: a Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In Proc. of IEEE Infocom'03.
Zhou, L. and Haas, Z. (1999). Securing Ad Hoc Networks. IEEE Network, 13(6):24–30.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Martinelli, F., Petrocchi, M., Vaccarelli, A. (2005). Local Management of Credits and Debits in Mobile Ad Hoc Networks. In: Chadwick, D., Preneel, B. (eds) Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 175. Springer, Boston, MA. https://doi.org/10.1007/0-387-24486-7_3
Download citation
DOI: https://doi.org/10.1007/0-387-24486-7_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24485-3
Online ISBN: 978-0-387-24486-0
eBook Packages: Computer ScienceComputer Science (R0)