Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.1.35

A Reputation Compensation Protocol For Mobile Ad Hoc Networks  

Lei, Zhu (INHA University Graduate School of IT&T)
Kang, Jeon-Il (INHA University Graduate School of IT&T)
Nyang, Dae-Hun (INHA University Graduate School of IT&T)
Abstract
The area of ad hoc networking has been receiving increasing attention among researchers in recent years and a variety of routing protocols targeted specifically at the ad hoc networking environment have been proposed. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. We propose a scheme as a mean to mitigate the detrimental effect of selfish nodes. We also propose a new area that might affect nodes' behavior - the environment's influence. In order to let nodes fairly be able to communicate in the networks we proposed solution to this problem. And our scheme can be applied to other reputation methods. We also contain the simulation results in our paper, and through the result, we can conclude that we can solve the problem by adding a little overhead.
Keywords
Ad hoc; Reputation;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 IETF MANET Working Group Internet Drafts. http//www.ietforg/ids.by.wg/rnanet.html
2 J. Broch. David B. Johnson and David A. Maltz, 'The dynamic source routing protocol for mobile ad hoc networks', Internet-Draft Version 03, IETF, October 1999
3 Pirzada, A. A. and McDonald, C. 'Establishing trust in pure ad-hoc networks'. ACM International Conference Proceeding Series. Vol. 56. Proceedings of the 27th conference on Australasian computer science - Volume 26
4 S. Buchegger and J.-Y. L. Boudec, 'Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks', Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain: IEEE Computer Society, January 2002, pp. 403--410
5 박영희, 정병천, 이윤호, 김희열, 이재원, 윤현수, 'Diffie-Hallman 키 교환을 이용한 확장성을 가진 계층적 그룹키 설정 프로토콜', 한국정보보호학회, 정보보호학회논문지 제13권 5호, 2003
6 Pietro Michiardi and Refik Melva, 'CORE: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks', Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, p.l07-121, September 26-27, 2002
7 조태남, 이상호, '(2,4)-트리를 이용한 그룹키 관리', 한국정보보호학회, 정보보호학회논문지 제11권 4호, pp. 64-77, 2001
8 L. Zhou and Z.J. Haas, 'Securing ad hoc networks', IEEE Network Magazine. vol.13, no.6, November December 1999
9 The Network Simulator - ns-2. http://www.isl.edu/nsnam/ns/. 2002
10 이상원, 천정희, 김용대, 'Pairing을 이용한 트리 기반 그룹키 합의 프로토콜', 한국정보보호학회, 정보보호학회논문지 제13권 3호, 2003
11 The CMU Monarch Project, 'The CMU Monarch Projects Wireless and Mobility Extensions', Http://www.monarch.cs.rice.edu/crnu-ns.html. Oct. 12, 1999
12 Sonja Buchegger and Jean-Yves Le Boudec. 'Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)', In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002
13 권정옥, 황정연, 김현정, 이동훈, 임종인, '일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜 : ELKH', 한국정보보호학회, 정보보호학회논문지 제12권 6호, 2002
14 박영호, 이경현, '이동네크워크 환경에서 그룹키 관리구조', 한국정보보호학회, 정보보호학회논문지 제12권 2호 pp. 77-89, 2002
15 Prashant Dewan, Partha Dasgupta and Amiya Bhattacharya. 'On Using Reputations in Ad hoc Networks to Counter Malicious Nodes', QoS and Dynamic Systems in conjunction with IEEE ICPADS Newport Beach, USA, 2004
16 Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker, 'Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks', Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000)