[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/513800.513828acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
Article

Performance analysis of the CONFIDANT protocol

Published: 09 June 2002 Publication History

Abstract

Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However,it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or reported routing and forwarding behavior of other nodes. The detailed implementation of CONFIDANT in this paper assumes that the network layer is based on the Dynamic Source Routing (DSR) protocol. We present a performance analysis of DSR fortified by CONFIDANT and compare it to regular defenseless DSR. It shows that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network. All simulations have been implemented and performed in GloMoSim.

References

[1]
Ross Anderson and Frank Stajano. The resurrecting duckling. Lecture Notes in Computer Science, Springer-Verlag, 1999.
[2]
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of IEEE Conference on Security and Privacy, Oakland, CA, 1996.
[3]
Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403--410, Canary Islands, Spain, January 2002. IEEE Computer Society.
[4]
Levente Buttyán and Jean-Pierre Hubaux. Enforcing service availability in mobile ad-hoc wans. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000.
[5]
Levente Buttyán and Jean-Pierre Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. MONET Journal of Mobile Networks, to appear 2002.
[6]
Richard Dawkins. The Selfish Gene.Oxford University Press, 1989 edition, 1976.
[7]
Raj Jain. The Art of Computer Systems Performance Analysis. John Wiley & Sons, New York, 1989 edition, 1991. All you need to know about performance analysis.
[8]
Dave B. Johnson and David A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October 1999.
[9]
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255--265, 2000.
[10]
MICS. The terminodes project. http://www.terminodes.org, 2002.
[11]
S. L. Murphy and M. R. Badger. Digital signature protection of the OSPF routing protocol. IEEE, 1996.
[12]
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trusting mobile user devices and security modules. In Computer, pages 61--68. IEEE, February 1997.
[13]
Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. Reputation systems. Communications of the ACM, 43(12):45--48, 2000.
[14]
Bruce Schneier. Secrets and Lies. Digital Security in a Networked World. John Wiley & Sons, Inc., 1 edition, 2000.
[15]
Bradley R. Smith, Shree Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pages 85--92, February 1997.
[16]
Seung Yi, Prasad Naldurg, and Robin Kravets. Security-aware ad-hoc routing for wireless networks. MobiHOC Poster Session, 2001.
[17]
Xiang Zeng, Rajive Bagrodia, and Mario Gerla. GloMoSim: A library for parallel simulation of large-scale wireless networks. Proceedings of the 12th Workshop on Parallel and Distributed Simulations--PADS '98, May 26--29, in Banff, Alberta, Canada, 1998.
[18]
Lidong Zhou and Zygmunt Haas. Securing ad hoc networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/Dezember, pages 24--30, 1999.
[19]
P. Zimmerman. PGP user's guide, 1993.

Cited By

View all

Index Terms

  1. Performance analysis of the CONFIDANT protocol

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
    June 2002
    246 pages
    ISBN:1581135017
    DOI:10.1145/513800
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 June 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cooperation
    2. fairness
    3. mobile ad-hoc networks
    4. reputation
    5. robustness
    6. routing
    7. trust

    Qualifiers

    • Article

    Conference

    MobiHoc02
    Sponsor:

    Acceptance Rates

    MobiHoc '02 Paper Acceptance Rate 22 of 134 submissions, 16%;
    Overall Acceptance Rate 296 of 1,843 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)100
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Conception of a Malicious Node Detection System for Tactical Wireless Sensor NetworksProblems of Mechatronics Armament Aviation Safety Engineering10.5604/01.3001.0054.912315:4(27-48)Online publication date: 30-Dec-2024
    • (2024)Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding AttackApplied Sciences10.3390/app1407287414:7(2874)Online publication date: 29-Mar-2024
    • (2024)Security-ANODR for provisioning of neighbour security in MANETsi-manager’s Journal on Wireless Communication Networks10.26634/jwcn.12.2.2086812:2(38)Online publication date: 2024
    • (2024)Reputation-based joint optimization of user satisfaction and resource utilization in a computing force network基于声誉机制的算力网络资源利用率和用户满意度联合优化Frontiers of Information Technology & Electronic Engineering10.1631/FITEE.230015625:5(685-700)Online publication date: 7-Jun-2024
    • (2024)A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network2024 Second International Conference on Data Science and Information System (ICDSIS)10.1109/ICDSIS61070.2024.10594465(1-6)Online publication date: 17-May-2024
    • (2024)Opportunistic Network Selfish Node Detection Algorithm Based on Credibility Combining Energy and Cache2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD61410.2024.10580681(1603-1608)Online publication date: 8-May-2024
    • (2024)Enhanced trust management for building trustworthy social internet of things networkIET Networks10.1049/ntw2.12111Online publication date: 4-Jan-2024
    • (2024)A Hybrid Routing Protocol to Establish Communication in Mobility Cast Using Mobility PatternWireless Personal Communications10.1007/s11277-024-11081-8135:2(875-898)Online publication date: 2-May-2024
    • (2024)Misreporting Attacks Against Load Balancers in Software-Defined NetworkingMobile Networks and Applications10.1007/s11036-023-02156-028:4(1482-1497)Online publication date: 9-Jan-2024
    • (2024)A Way to Elude the Distributed Denial-of-Service Attack in Regulated SurroundingsNavigating the Technological Tide: The Evolution and Challenges of Business Model Innovation10.1007/978-3-031-67437-2_12(123-134)Online publication date: 28-Jul-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media