Abstract
Mobile ad hoc networks rely on the co-operation of devices that route for each other. This immediately presents security problems. Each device's data passes through the not so friendly hands of other devices. Forwarding devices must use their processing power and battery power to route packets for others. When bandwidth is limited they must also use bandwidth that they might want to use for themselves. These are not great issues with the first incarnations of ad hoc networks — military systems or others where all the devices are owned by a single organisation. However, if ad hoc networks are to be generally deployed and become an alternative or adjunct to future cellular systems, then ways to encourage co-operation are required.
Similar content being viewed by others
References
IETF MANET working group-http://www.ietf.org/html.charters/ manet-charter.html
Gedge R: ‘Symbiotic networks’, BT Technol J, 21, No 3, pp 67-73 (July 2003).
Zhou L and Haas Z J: ‘Securing Ad Hoc Networks’, IEEE Network, 13, No 6, pp 24-30 (November-December 2002).
Levmore S: ‘The Anonymity Tool’, University of Pennsylvania Law Review, 144, No 5, pp 2191-2236 (1996).
Zacharia G, Moukas A and Maes P: ‘Collaborative Reputation Mechanisms’, in Electronic Marketplaces, Proceedings of the 32nd Hawaii International Conference on System Sciences (1999).
Fehr E and Gachter S: ‘Altruistic Punishment in Humans’, Nature, 415, pp 137-140 (January 2002).
Axelrod R: ‘The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration’, Princeton University Press (1997).
Friedman E and Resnick P: ‘The Social Cost of Cheap Pseudonyms’, Journal of Economics and Management Strategy, 10, No 2, pp 173-199 (2001).
MMAPPS project page-http://www.mmapps.org/
Shirky C: ‘The Case Against Micropayments’,-http://www.openp2p. com/pub/a/p2p/2000/12/19/micropayments.html
Terminodes-http://www.terminodes.org/
Buttyan L and Hubaux J-P: ‘Stimulating Cooperation in Self-Organising Mobile Ad Hoc Networks’, to appear in ACM/Kluwer Mobile Networks and Applications (MONET), 8, No 5 (October 2003).
Barreto D et al: ‘Ad Hoc Participation Economy’,-http:// www.stanford.edu/~barretod/
Marti S, Giuli T J, Lai K and Baker M: ‘Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks’, in Proceedings of Mobicom 2000, Boston (August 2000).
Buchegger S and Le Boudec J-Y: ‘Devices Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks’, in Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp 403-410, Canary Islands (2002).
Dawkins R: ‘The Selfish Gene’, Oxford University Press (1976).
About this article
Cite this article
Strulo, B., Farr, J. & Smith, A. Securing Mobile Ad hoc Networks — A Motivational Approach. BT Technology Journal 21, 81–89 (2003). https://doi.org/10.1023/A:1025111232045
Issue Date:
DOI: https://doi.org/10.1023/A:1025111232045