Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Coopertive Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness
Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI)
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Proceedings of the 9th annual international conference on Mobile computing and networking
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
The Impact of Free-Riding on Peer-to-Peer Networks
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
The performance of a watchdog protocol for wireless network security
International Journal of Wireless and Mobile Computing
Incentive-compatible opportunistic routing for wireless networks
Proceedings of the 14th ACM international conference on Mobile computing and networking
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Mobi-watchdog: you can steal, but you can't run!
Proceedings of the second ACM conference on Wireless network security
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
Editorial: Special Section: Trusted computing
Future Generation Computer Systems
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
OPTIMIS: A holistic approach to cloud service provisioning
Future Generation Computer Systems
From blurry numbers to clear preferences: A mechanism to extract reputation in social networks
Expert Systems with Applications: An International Journal
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks
Wireless Personal Communications: An International Journal
A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Mobile ad hoc networks are deployed under the assumption that participating nodes are willing to forward other nodes' packets. However, for civilian applications where nodes are not owned by a single entity but are profit-oriented independent agents, cooperation cannot be taken for granted. In this paper, we present a novel reputation computation model to discover and prevent selfish behaviors by combining familiarity values with subjective opinions. The familiarity value represents a node's familiar degree with another individual node. In our model, a node that queries another's reputation first accumulates subjective opinions from their common neighbors. The familiarity values are used to calculate the weighting factor that determines how much a node's recommending opinion impacts on the reputation computation result. The utilization of this familiarity allows nodes to obtain opinions with lower uncertainty values, which helps nodes to recognize selfish nodes much earlier and can decrease the convergence time for isolating selfish nodes. We evaluate the performance of our model based on ns-2 simulations to analyze the impact of different parameters on the network performance. The simulation results show that our model outperforms the pure subjective logic-based model and achieves up to a 25% improvement in the convergence time.