Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand minimum energy routing protocol for a wireless ad hoc network
ACM SIGMOBILE Mobile Computing and Communications Review
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Hi-index | 0.00 |
The resource limitation of nodes forming ad hoc networks along with the multi-hop nature of these networks rise a new problem. To preserve its energy a node may behave selfishly and would not forward packets for others, while using their services and consuming their resources. This paper presents a new monitoring solution that mitigates limitations of the watchdog-based monitoring, upon which rely most of the state-of-the-art solutions. The overhead of the proposed solution, termed Two-hop acknowledgment, is gradually decreased through the use of the lower layer acknowledgments (piggybacking), as well as aggregations.