skip to main content
10.1145/1185448.1185475acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

LARS: a locally aware reputation system for mobile ad hoc networks

Published:10 March 2006Publication History

ABSTRACT

Mobile ad hoc networks (MANETs) have nodes that are dynamically and arbitrarily located. The nodes are often battery powered and may behave selfishly to preserve power. A promising mechanism to deal with node selfishness is to use reputation methods. In this paper, we discuss some general issues with current reputation methods that are used to mitigate selfish node behavior and propose a simple and efficient Locally Aware Reputation System (LARS) for which the reputation of the nodes is derived by using direct observation. LARS is flexible and can deal with both extreme selfishness and selective selfishness.

References

  1. C. E. Perkins, Ad Hoc Networking, Addison-Wesley, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Conti, E. Gregori, and G. Maselli. Cooperation Issues in Mobile Ad Hoc Networks, Int. Workshop on Wireless Ad Hoc Networking (WWAN), Proc. IEEE ICDCS Workshops, Tokyo, Japan, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad hoc Networks, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.Google ScholarGoogle Scholar
  5. Y-C Hu, A. Perrig, D. B. Johnson, Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks, Proc. MOBICOM 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding-Royer, A secure routing protocol for ad hoc networks, International Conference on Network Protocols (ICNP), 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure and efficient distance vector routing for mobile wireless ad hoc networks, 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Buttyan and J-P. Hubaux, Enforced Service Availability in Mobile Ad-Hoc WANs, Proc. MobiHoc 2000 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. B. Salem, L. Buttyan, J-P. Hubaux, M. Jakobsson, A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, Proc. MobiHoc 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Zhong, J. Chen, and Y. R. Yang, Sprite: A simple, Cheat-proof, Credit-based System for Mobile Ad hoc Networks, Proc. IEEE Infocom '03.Google ScholarGoogle Scholar
  11. S. Buchegger and J-Y. Le Boudec, Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks, Proc. MobiHoc 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Buchegger, J-Y. Le Boudec, A Robust Reputation System for P2P and Mobile Ad-hoc Networks, Proc. 2nd Workshop on the Economics of Peer-to-Peer Systems, 2004.Google ScholarGoogle Scholar
  13. P. Michiardi, R. Molva, Core: A Collaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks, IFIP-Communicatin and Multimedia Security Conference 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Bansal and M. Baker, Observation-based Cooperation Enforcement in Ad Hoc Networks, Technical report, Stanford University, NI/0307012, 2003.Google ScholarGoogle Scholar
  15. S. Buchegger and J-Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks. Proc. WiOpt '03.Google ScholarGoogle Scholar
  16. P. Yau and C. J. Mitchell, Reputation methods for routing security for mobile ad hoc networks, Proc. SympoTIC '03.Google ScholarGoogle Scholar
  17. P. Yau and C. J. Mitchell, Security vulnerabilities in ad hoc networks, 7th Intern. Symp. Communication Theory and Applications, 2003.Google ScholarGoogle Scholar
  18. S. Buchegger, J-Y. Le Boudec, Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Wang, V. C. Giruka, M. Singhal. A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks. ADHOC-NOW 2004.Google ScholarGoogle Scholar
  20. http://www.isi.edu/nsnam/ns/Google ScholarGoogle Scholar
  21. C. Bettstetter and C. Wagner. The Spatial Node Distribution of the Random Waypoint Mobility Model. Proc. 1st German Workshop on Mobile Ad-Hoc Networks (WMAN02), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. LARS: a locally aware reputation system for mobile ad hoc networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ACM-SE 44: Proceedings of the 44th annual Southeast regional conference
            March 2006
            823 pages
            ISBN:1595933158
            DOI:10.1145/1185448

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 10 March 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate178of377submissions,47%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader