On using reputations in ad hoc networks to counter malicious nodes

Prashant Dewan, Partha Dasgupta, Amiya Bhattacharya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

56 Scopus citations

Abstract

Nodes in mobile ad hoc networks have a limited transmission range. Hence the nodes expect their neighbors to relay packets meant for far off destinations. These networks are based on the fundamental assumption that if a node promises to relay a packet, it will relay it and will not cheat. This assumption becomes invalid when the nodes in the network have tangential or contradictory goals. The reputations of the nodes, based on their past history of relaying packets, can be used by their neighbors to ensure that the packet will be relayed by the node. This paper introduces a reputation scheme for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses a path whose next hop node has the highest reputation. This policy, when used recursively, in the presence of 40% malicious nodes, improves the throughput of the system to 65%, from 22% throughput provided by AODV. This improvement is obtained at the cost of a higher number of route discoveries with a minimal increase in the average hop length.

Original languageEnglish (US)
Title of host publicationProceedings of the International Conference on Parallel and Distributed Systems - ICPADS
EditorsN.F. Tzeng
Pages665-672
Number of pages8
Volume10
DOIs
StatePublished - 2004
EventProceedings - Tenth International Conference on Parallel and Distributed Systems (ICPADS 2004) - Newport Beach, CA, United States
Duration: Jul 7 2004Jul 9 2004

Other

OtherProceedings - Tenth International Conference on Parallel and Distributed Systems (ICPADS 2004)
CountryUnited States
CityNewport Beach, CA
Period7/7/047/9/04

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'On using reputations in ad hoc networks to counter malicious nodes'. Together they form a unique fingerprint.

  • Cite this

    Dewan, P., Dasgupta, P., & Bhattacharya, A. (2004). On using reputations in ad hoc networks to counter malicious nodes. In N. F. Tzeng (Ed.), Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS (Vol. 10, pp. 665-672) https://doi.org/10.1109/ICPADS.2004.1316153