2010
DOI: 10.1109/tc.2010.34
|View full text |Cite
|
Sign up to set email alerts
|

Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks

Abstract: Reputation management systems have been proposed as a cooperation enforcement solution in ad hoc networks. Typically, the functions of reputation management (evaluation, detection, and reaction) are carried out homogeneously across time and space. However, the dynamic nature of ad hoc networks causes node behavior to vary both spatially and temporally due to changes in local and network-wide conditions. When reputation management functions do not adapt to such changes, their effectiveness, measured in terms of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 27 publications
0
27
0
Order By: Relevance
“…The node behaviors sometimes are driven by changes in the dynamic network environment, therefore, a time-slotted approach can accurately capture the variation of node behaviors. In order to distinguish cooperation and misbehaviors, Work [5] established the detection function to utilize the sequential probability ratio test (SPRT). Except for stimulating the routing forwarding services of selfish nodes, the reputation was also applied to the security routing attacks (e.g., black-hole and gray-hole attacks) in the wireless mesh network [6].…”
Section: Related Workmentioning
confidence: 99%
“…The node behaviors sometimes are driven by changes in the dynamic network environment, therefore, a time-slotted approach can accurately capture the variation of node behaviors. In order to distinguish cooperation and misbehaviors, Work [5] established the detection function to utilize the sequential probability ratio test (SPRT). Except for stimulating the routing forwarding services of selfish nodes, the reputation was also applied to the security routing attacks (e.g., black-hole and gray-hole attacks) in the wireless mesh network [6].…”
Section: Related Workmentioning
confidence: 99%
“…In [1] and [2], malicious nodes are isolated based on their reputations. Their work fails to take advantage of IDS alerts and simple isolation may cause unexpected network partition.…”
Section: Related Workmentioning
confidence: 99%
“…Several work [1], [2] addressed the intrusion response actions in MANET by isolating uncooperative nodes based on the node reputation derived from their behaviors. Such a simple response against malicious nodes often neglects possible negative side effects involved with the response actions.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore cooperation among different nodes is essential for effective wireless network operation [18]. To satisfy this goal, we design an effective trust evaluation mechanism.…”
Section: Trust Evaluation Mechanismmentioning
confidence: 99%