Abstract
Within Ad hoc networks, IP connectivity is achieved with the help of multi-hop routing; nodes are supposed to cooperate and act as routers for the benefit of the others. However, this cooperation-based paradigm has limitations, because nodes do not always make their resources available, properly. We propose a reputation-based routing protocol, called MOOR, for application to hybrid Ad hoc networks. MOOR aims at improving the reliability of communications between Ad hoc nodes and the gateway to an infrastructure-based network. We present an application–motivated performance analysis of our protocol MOOR, which allows to quantify the benefit in terms of radio network coverage increase. The impact of non-cooperative nodes on a MOOR protected network remains rather low, even for nodes located 5 hops away from the gateway.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Buttyan, L., Hubaux, J.: Nuglets: A virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report, EPFL (2001)
Ingelrest, F., Simplot-Ryl, D., Stojmenovi’c, I.: Routing and broadcasting in hybrid ad hoc multi-hop cellular and wireless Internet networks. Technical Report INRIA RT-291 (February 2004)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Laniepce, S., Demerjian, J., Mokhtari, A.: Cooperation Monitoring Issues in Ad Hoc Networks. In: IWCMC 2006. Proceedings of International Wireless Communications and Mobile Computing Conference, Vancouver (2006)
Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: MobiHoc. Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne (June 2002)
Michiardi, P., Molva, R.: CORE: A COllaborative Reputation Mechanism to enforce node cooperation, Mobile Ad Hoc Networks. In: CMS 2002. Proceedings of the sixth IFIP conference on security communications and multimedia (September 2002)
He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad hoc networks. In: WCNC 2004. IEEE Wireless Communications and Networking Conference, Atlanta, GA, USA (March 2004)
Jensen, C.D., Connell, P.O: Trust-Based Route Selection in Dynamic Source Routing. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 150–163. Springer, Heidelberg (2006)
Li, J., Blake, C., Couto, D.S.J.D., Lee, H.I., Morris, R.: Capacity of ad hoc wireless networks. In: ACM MOBICOM (July 2001)
Johnson, D.B., Maltz, D.A., Hu, Y.: The Dynamic Source Routing Protocol for Mobile Ad hoc Networks, <draft-ietf-manet-dsr-10.txt>, (expired July 19, 2004)
Dyer, T.D., Boppana, R.V.: A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad hoc Networks. In: ACM Symposium on Mobile Ad hoc Networking and Computing, MobiHoc (October 2001)
Rajagopalan, S., Shen, C.: What does using TCP as an Evaluation Tool Reveal about MANET Routing Protocols? In: IWCMC 2006. Proceedings of the International Wireless Communications and Mobile Computing Conference 2006, Vancouver, British Columbia, Canada (July 2006)
Laniepce, S., Karpagavinayagam, B., Tourolle, B.: Impacts of “On/Off” Forwarding Misbehavior on Reputation Systems in ad hoc networks. In: IWCMC 2006. Proceedings of the International Wireless Communications and Mobile Computing Conference 2006, Vancouver, British Columbia, Canada (July 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tourolle, B., Laniepce, S., Achemlal, M. (2007). Reputation-Based Routing in Hybrid Ad Hoc Networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-77024-4_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77023-7
Online ISBN: 978-3-540-77024-4
eBook Packages: Computer ScienceComputer Science (R0)