Skip to main content

Path-Based Reputation System for MANET Routing

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5546))

Abstract

Most existing reputation systems in mobile ad hoc networks (MANET) consider only node reputations when selecting routes. Therefore, reputation and trust are only ensured within a one-hop distance when routing decisions are made. This often fails to provide the most reliable, trusted route. In this paper we propose a system that is based on path reputation, which is computed from the reputation and trust values of each and every node in the route. This greatly enhances the reliability of the resulting routes. The system is simulated on top of the AODV (Ad-hoc On-demand Distance Vector) routing protocol. It is effective at detecting misbehaving nodes, including selfishness and worm-hole attacks. It greatly improves network throughput in the midst of malicious nodes and requires very limited message overhead. To our knowledge, this is the first path-based reputation system proposal that is applicable to non-source-based routing schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anker, T., Dolev, D., Hod, B.: Cooperative and Reliable Packet Forwarding on top of AODV. In: Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, Ad-hoc, and Wireless Networks, Boston, MA, April 2006, pp. 1–10 (2006)

    Google Scholar 

  2. Bansal, S., Baker, M.: Observation-based cooperation enforcement in ad hoc networks. Technical Report CS/0307012, Stanford University (2003)

    Google Scholar 

  3. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proc. 3rd ACM Int. Symp. on Mobile Ad Hoc Network & comput., pp. 226–236 (2002)

    Google Scholar 

  4. Buchegger, S., Le Boudec, J.Y.: A Robust Reputation System for Mobile ad hoc Networks. EPFL IC_Tech_Report_200350 (2003)

    Google Scholar 

  5. He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad hoc networks. In: IEEE Wireless Communications and Networking Conference (WCNC 2004), Atlanta, GA, USA (March 2004)

    Google Scholar 

  6. Hu, J., Burmester, M.: LARS: a locally aware reputation system for mobile ad hoc networks. In: Proc. of the 44th Annual Southeast Regional Conference, pp. 119–123 (2006)

    Google Scholar 

  7. Li, J.: Design, Analysis, and Evaluation of Path-based Reputation System for MANET Routing, Master Thesis, Dept. of Computer Science, San Jose State Univ. (2008)

    Google Scholar 

  8. Li, X., Lyu, M.R., Liu, J.: A Trust model based routing protocol for secure ad hoc networks. In: Proc. of the IEEE Aerospace Conference, March 2004, pp. 1286–1295 (2004)

    Google Scholar 

  9. Lai, K., Baker, M., Marti, S., Giuli, T.: Mitigating routing Misbehavior in mobile Ad hoc networks. In: Proceedings of MOBICOM 2000, pp. 255–265 (2000)

    Google Scholar 

  10. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: IFIP TC6/TC11 6th Joint Working Conf. on Comm. and Multimedia Security: Adv. Comm. and Multimedia Security, pp. 107–121 (2002)

    Google Scholar 

  11. Moh, M., Li, J.: A survey of reputation and trust systems for mobile ad-hoc network routing. In: Accepted to appear in Handbook of Communication and Information Security, edited by Stamp, M. Springer, Heidelberg (2009)

    Google Scholar 

  12. Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. In: Ad Hoc Networks, vol. 3(6), pp. 795–819 (November 2005)

    Google Scholar 

  13. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (1999)

    Google Scholar 

  14. Raza, I., Hussain, S.A.: A Trust based Security Framework for Pure AODV Network. In: Proc. of the Int. Conf. on Information and Emerging Technologies (ICIET), Karachi, Pakistan, July 6-7, 2007, pp. 1–6 (2007)

    Google Scholar 

  15. Rebahi, Y., Mujica, V., Simons, C., Sisalem, D.: SAFE: Securing pAcket Forwarding in ad hoc nEtworks. In: Proc. 5th Workshop on Applications and Services in Wireless Networks (2005)

    Google Scholar 

  16. Zeng, X., Bagrodia, R., et al.: GloMoSim: a Library for Parallel Simulation of Large-scale Wireless Networks. In: 12th Int. Workshop on Parallel and Distributed Simulations (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, J., Moh, TS., Moh, M. (2009). Path-Based Reputation System for MANET Routing. In: van den Berg, H., Heijenk, G., Osipov, E., Staehle, D. (eds) Wired/Wireless Internet Communications. WWIC 2009. Lecture Notes in Computer Science, vol 5546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02118-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02118-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02117-6

  • Online ISBN: 978-3-642-02118-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics