{"title":"移动自组织网络路由安全的信誉方法","authors":"P. Yau, Chris J. Mitchell","doi":"10.1109/TIC.2003.1249106","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. Malicious nodes may deliberately disrupt the network using a variety of attacks. The paper discusses reputation mechanisms which have been suggested as a means to mitigate the detrimental effect of selfish and malicious nodes. The paper reveals reasons why complex reputation systems may be too inefficient to use in a mobile ad hoc network, where resources are limited. However, suggestions are also made to show how a simple reputation system might be used to enhance the robustness of ad hoc networks.","PeriodicalId":177770,"journal":{"name":"SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications","volume":"165 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"85","resultStr":"{\"title\":\"Reputation methods for routing security for mobile ad hoc networks\",\"authors\":\"P. Yau, Chris J. Mitchell\",\"doi\":\"10.1109/TIC.2003.1249106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. Malicious nodes may deliberately disrupt the network using a variety of attacks. The paper discusses reputation mechanisms which have been suggested as a means to mitigate the detrimental effect of selfish and malicious nodes. The paper reveals reasons why complex reputation systems may be too inefficient to use in a mobile ad hoc network, where resources are limited. However, suggestions are also made to show how a simple reputation system might be used to enhance the robustness of ad hoc networks.\",\"PeriodicalId\":177770,\"journal\":{\"name\":\"SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications\",\"volume\":\"165 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"85\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TIC.2003.1249106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TIC.2003.1249106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reputation methods for routing security for mobile ad hoc networks
Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. Malicious nodes may deliberately disrupt the network using a variety of attacks. The paper discusses reputation mechanisms which have been suggested as a means to mitigate the detrimental effect of selfish and malicious nodes. The paper reveals reasons why complex reputation systems may be too inefficient to use in a mobile ad hoc network, where resources are limited. However, suggestions are also made to show how a simple reputation system might be used to enhance the robustness of ad hoc networks.