A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
KEPPAN: Knowledge exploitation for proactively-planned ad-hoc networks
Journal of Network and Computer Applications
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
A reputation system for traffic safety event on vehicular ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on enabling Wireless Technologies for Green Pervasive Computing
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
Robust detection of primary user emulation attacks in IEEE 802.22 networks
Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management
A forwarding spurring protocol for multihop ad hoc networks (FURIES)
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Analysing the development of cooperation in MANETs using evolutionary game theory
The Journal of Supercomputing
Hi-index | 0.00 |
The employment of adequate trust methods in mobile ad hoc networks (MANET) has been receiving increasing attention during the last few years, and several trust and security establishment solutions that rely on cryptographic and hashing schemes have been proposed. These schemes, although effective, produce significant processing and communication overheads and consume energy, and, hence, they do not take into account the idiosyncrasies of a MANET. More recently, cooperation enforcement methods have been proposed for trust establishment in MANET. These schemes, classified as reputation-based and credit-based, are considered suitable for ad hoc networks, where key or certificate distribution centers are absent or ephemerally present, and for networks that consist of devices with limited processing, battery, and memory resources. Cooperation enforcement methods do not provide strong authentication of entities. Instead, they contribute to the identification of the trustworthiness of peers and to the enforcement cooperation using mutual incentives. This paper surveys the most important cooperation enforcement methods that have been introduced, providing a comprehensive comparison between the different proposed schemes. Copyright © 2006 John Wiley & Sons, Ltd.