{"title":"A survey on reputation-based cooperation enforcement schemes in wireless ad hoc networks","authors":"M. Louta, Stylianos Kraounakis, A. Michalas","doi":"10.5220/0002986400900093","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks rely on node cooperation to perform and support basic functions like packet forwarding, routing and network management. In general, nodes' misbehaviour can significantly degrade the performance of the network. Cooperation enforcement schemes are seen as a lightweight alternative to conventional security techniques, providing a “softer” security layer to protect basic networking operations. The aim of this paper is to survey representative cooperation enforcement schemes exploiting a reputation system proposed in related research literature. Their distinct features are analyzed and their relative merits and weaknesses are discussed.","PeriodicalId":332730,"journal":{"name":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Wireless Information Networks and Systems (WINSYS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0002986400900093","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Mobile ad hoc networks rely on node cooperation to perform and support basic functions like packet forwarding, routing and network management. In general, nodes' misbehaviour can significantly degrade the performance of the network. Cooperation enforcement schemes are seen as a lightweight alternative to conventional security techniques, providing a “softer” security layer to protect basic networking operations. The aim of this paper is to survey representative cooperation enforcement schemes exploiting a reputation system proposed in related research literature. Their distinct features are analyzed and their relative merits and weaknesses are discussed.