Minimum payments that reward honest reputation feedback
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Cooperation monitoring issues in ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Evolution of cooperation in ad hoc networks under game theoretic model
Proceedings of the 4th ACM international workshop on Mobility management and wireless access
Reputation in self-organized communication systems and beyond
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
SNARE: sensor node attached reputation evaluator
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Using context information to evaluate cooperativeness
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks
Information Security Journal: A Global Perspective
A Lightweight Management System for a Military Ad Hoc Network
Information Networking. Towards Ubiquitous Networking and Services
Fuzzy Logic Based Reputation System for Mobile Ad Hoc Networks
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Proceedings of the second ACM conference on Wireless network security
OMH: suppressing selfish behavior in ad hoc networks with One More Hop
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 2009 International Conference on Hybrid Information Technology
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Reputation-based content dissemination for user generated wireless podcasting
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
An Architecture for Dynamic Trust Monitoring in Mobile Networks
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
Optimal monotone forwarding policies in delay tolerant mobile ad-hoc networks
Performance Evaluation
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
A trust approach for node cooperation in MANET
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Analysis of distributed packet forwarding trategies in ad hoc networks
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
PROTECT: proximity-based trust-advisor using encounters for mobile societies
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Bandwidth exchange: an energy conserving incentive mechanism for cooperation
IEEE Transactions on Wireless Communications
Detection of selfish nodes in networks using CoopMAC protocol with ARQ
IEEE Transactions on Wireless Communications
Probabilistic packet relaying in wireless mobile ad hoc networks
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
cTrust: trust aggregation in cyclic mobile ad hoc networks
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
A reputation system for wireless mesh networks using network coding
Journal of Network and Computer Applications
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Perspectives of selfish behaviour in mobile ad hoc networks
NMA'10 Proceedings of the 7th international conference on Numerical methods and applications
Rescuing wireless sensor networks security from science fiction
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Dynamic cooperator selection in cognitive radio networks
Ad Hoc Networks
Evaluation of collaborative selfish node detection in MANETS and DTNs
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Discovering trustworthy social spaces
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Understanding the effects of P2P dynamics on trust bootstrapping
Information Sciences: an International Journal
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs
Wireless Personal Communications: An International Journal
Hi-index | 0.25 |
Node misbehavior due to selfish or malicious reasons or faulty nodes can significantly degrade the performance of mobile ad hoc networks. To cope with misbehavior in such self-organized networks, nodes need to be able to automatically adapt their strategy to changing levels of cooperation. Existing approaches such as economic incentives or secure routing by cryptography alleviate some of the problems, but not all. We describe the use of a self-policing mechanism based on reputation to enable mobile ad hoc networks to keep functioning despite the presence of misbehaving nodes. The reputation system in all nodes makes them detect misbehavior locally by observation and use of second-hand information. Once a misbehaving node is detected it is automatically isolated from the network. We classify the features of such reputation systems and describe possible implementations of each of them. We explain in particular how it is possible to use second-hand information while mitigating contamination by spurious ratings.