Advertisement

Reputation Based Localized Access Control for Mobile Ad-Hoc Networks

  • Sangheethaa Sukumaran
  • Elijah Blessing
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4104)

Abstract

The absence of a router or a base station urges the need for better access control mechanism in the ad-hoc networks. This paper presents a localized approach for access control which implements ticket certification services through reputation mechanism. Reputation refers to, the opinion of one node as seen by other nodes. Ticket certification ensures that, only well behaving nodes (which forward and route packets of other nodes) can get the tickets and only they can access the network. The tickets are obtained from any node in the locality with high reputation instead of getting it from a centralized authority or from some k neighbors in the neighborhood. This paper gives the analysis and simulation results of the localized approach through reputation mechanism and proves that the localized access control with reputation is better than the localized approach without reputation.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Buttayan, L., Hubaux, J.P.: Stimulating Cooperation in Self-organizing Mobile Ad-Hoc Networks. ACM/Kulwer Mobile Networks and Applications 8(5), 579–592 (2003)CrossRefGoogle Scholar
  2. 2.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks. In: Proc. ACM MOBICOM, pp. 255–265 (2000)Google Scholar
  3. 3.
    Zhou, L., Schnder, E.B., Can Renese, R.: COCA: a Secure Distributed on Line Certificate Authority. ACM Tran., Computer Sys. 2(4), 329–368 (2002)CrossRefGoogle Scholar
  4. 4.
    Appenzeller, G., Roussopoulous, M., Baker, M.: User-friendly access control for public network ports. In: Proc. IEEE INFOCOM, pp. 699–707 (1999)Google Scholar
  5. 5.
    Luo, H., Zerfos, P., Lu, S., Zhang, L.: URSA-Ubiquitous and Robust Access Control for Mobile Ad hoc Networks. IEEE/ACM Transactions on Networking 12(6), 1049–1063 (2004)CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Bucheggery, S., Le Boudec, J.-Y.: Self Policing Mobile Ad-hoc Networks by reputation Systems, Available online from: http://lcawww.epfl.ch/Publications/LeBoudec/BucheggerL05.pdf
  8. 8.
    Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes — Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of IEEE/ACM Symposium on Mobile Ad-Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)Google Scholar
  9. 9.
    Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia (2002)Google Scholar
  10. 10.
    Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, vol. 353, pp. 153–181. Kluwer, Norwell (1996)CrossRefGoogle Scholar
  11. 11.
    Frankel, Y., Gemmell, P.S., MacKenzie, P.D., Yung, M.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440–454. Springer, Heidelberg (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Sangheethaa Sukumaran
    • 1
  • Elijah Blessing
    • 2
  1. 1.Coimbatore Institute of TechnologyCoimbatoreIndia
  2. 2.Karunya Institute of Technology and SciencesCoimbatoreIndia

Personalised recommendations