Skip to main content
Log in

Securing Mobile Ad hoc Networks — A Motivational Approach

  • Published:
BT Technology Journal

Abstract

Mobile ad hoc networks rely on the co-operation of devices that route for each other. This immediately presents security problems. Each device's data passes through the not so friendly hands of other devices. Forwarding devices must use their processing power and battery power to route packets for others. When bandwidth is limited they must also use bandwidth that they might want to use for themselves. These are not great issues with the first incarnations of ad hoc networks — military systems or others where all the devices are owned by a single organisation. However, if ad hoc networks are to be generally deployed and become an alternative or adjunct to future cellular systems, then ways to encourage co-operation are required.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. IETF MANET working group-http://www.ietf.org/html.charters/ manet-charter.html

  2. Gedge R: ‘Symbiotic networks’, BT Technol J, 21, No 3, pp 67-73 (July 2003).

    Article  Google Scholar 

  3. Zhou L and Haas Z J: ‘Securing Ad Hoc Networks’, IEEE Network, 13, No 6, pp 24-30 (November-December 2002).

    Article  Google Scholar 

  4. Levmore S: ‘The Anonymity Tool’, University of Pennsylvania Law Review, 144, No 5, pp 2191-2236 (1996).

    Article  Google Scholar 

  5. Zacharia G, Moukas A and Maes P: ‘Collaborative Reputation Mechanisms’, in Electronic Marketplaces, Proceedings of the 32nd Hawaii International Conference on System Sciences (1999).

  6. Fehr E and Gachter S: ‘Altruistic Punishment in Humans’, Nature, 415, pp 137-140 (January 2002).

    Article  Google Scholar 

  7. Axelrod R: ‘The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration’, Princeton University Press (1997).

  8. Friedman E and Resnick P: ‘The Social Cost of Cheap Pseudonyms’, Journal of Economics and Management Strategy, 10, No 2, pp 173-199 (2001).

    Article  Google Scholar 

  9. MMAPPS project page-http://www.mmapps.org/

  10. Shirky C: ‘The Case Against Micropayments’,-http://www.openp2p. com/pub/a/p2p/2000/12/19/micropayments.html

  11. Terminodes-http://www.terminodes.org/

  12. Buttyan L and Hubaux J-P: ‘Stimulating Cooperation in Self-Organising Mobile Ad Hoc Networks’, to appear in ACM/Kluwer Mobile Networks and Applications (MONET), 8, No 5 (October 2003).

  13. Barreto D et al: ‘Ad Hoc Participation Economy’,-http:// www.stanford.edu/~barretod/

  14. Marti S, Giuli T J, Lai K and Baker M: ‘Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks’, in Proceedings of Mobicom 2000, Boston (August 2000).

  15. Buchegger S and Le Boudec J-Y: ‘Devices Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks’, in Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp 403-410, Canary Islands (2002).

  16. Dawkins R: ‘The Selfish Gene’, Oxford University Press (1976).

Download references

Authors

About this article

Cite this article

Strulo, B., Farr, J. & Smith, A. Securing Mobile Ad hoc Networks — A Motivational Approach. BT Technology Journal 21, 81–89 (2003). https://doi.org/10.1023/A:1025111232045

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1025111232045

Keywords

Navigation