On Using Reputations in Ad hoc Networks to Counter Malicious Nodes

  • Authors:
  • Prashant Dewan;Partha Dasgupta;Amiya Bhattacharya

  • Affiliations:
  • Arizona State University;Arizona State University;Arizona State University

  • Venue:
  • ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nodes in mobile ad hoc networks have a limited transmissionrange. Hence the nodes expect their neighbors torelay packets meant for far off destinations. These networksare based on the fundamental assumption that if a nodepromises to relay a packet, it will relay it and will not cheat.This assumption becomes invalid when the nodes in the networkhave tangential or contradictory goals.The reputations of the nodes, based on their past historyof relaying packets, can be used by their neighbors to ensurethat the packet will be relayed by the node. This paper introducesa reputation scheme for ad hoc networks. Insteadof choosing the shortest path to the destination, the sourcenode chooses a path whose next hop node has the highestreputation. This policy, when used recursively, in the presenceof 40% malicious nodes, improves the throughput ofthe system to 65%, from 22% throughput provided by AODV.This improvement is obtained at the cost of a higher numberof route discoveries with a minimal increase in the averagehop length.