Abstract
The absence of a router or a base station urges the need for better access control mechanism in the ad-hoc networks. This paper presents a localized approach for access control which implements ticket certification services through reputation mechanism. Reputation refers to, the opinion of one node as seen by other nodes. Ticket certification ensures that, only well behaving nodes (which forward and route packets of other nodes) can get the tickets and only they can access the network. The tickets are obtained from any node in the locality with high reputation instead of getting it from a centralized authority or from some k neighbors in the neighborhood. This paper gives the analysis and simulation results of the localized approach through reputation mechanism and proves that the localized access control with reputation is better than the localized approach without reputation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Buttayan, L., Hubaux, J.P.: Stimulating Cooperation in Self-organizing Mobile Ad-Hoc Networks. ACM/Kulwer Mobile Networks and Applications 8(5), 579–592 (2003)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks. In: Proc. ACM MOBICOM, pp. 255–265 (2000)
Zhou, L., Schnder, E.B., Can Renese, R.: COCA: a Secure Distributed on Line Certificate Authority. ACM Tran., Computer Sys. 2(4), 329–368 (2002)
Appenzeller, G., Roussopoulous, M., Baker, M.: User-friendly access control for public network ports. In: Proc. IEEE INFOCOM, pp. 699–707 (1999)
Luo, H., Zerfos, P., Lu, S., Zhang, L.: URSA-Ubiquitous and Robust Access Control for Mobile Ad hoc Networks. IEEE/ACM Transactions on Networking 12(6), 1049–1063 (2004)
Bucheggery, S., Le Boudec, J.-Y.: Self Policing Mobile Ad-hoc Networks by reputation Systems, Available online from: http://lcawww.epfl.ch/Publications/LeBoudec/BucheggerL05.pdf
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes — Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of IEEE/ACM Symposium on Mobile Ad-Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)
Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia (2002)
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, vol. 353, pp. 153–181. Kluwer, Norwell (1996)
Frankel, Y., Gemmell, P.S., MacKenzie, P.D., Yung, M.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440–454. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sukumaran, S., Blessing, E. (2006). Reputation Based Localized Access Control for Mobile Ad-Hoc Networks. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_17
Download citation
DOI: https://doi.org/10.1007/11814764_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37246-2
Online ISBN: 978-3-540-37248-6
eBook Packages: Computer ScienceComputer Science (R0)