Abstract
Most of the approaches for ad hoc networks assume that the nodes readily and honestly follow the protocol. Unfortunately, this assumption does not always hold in reality. Misbehaving in ad hoc networks can take place at different levels of the system architecture:
-
1
On the communication level, nodes can refuse to forward messages of others in order to save bandwidth and energy. Many misbehaving nodes would lead to a low reliability of the system. But such nodes can be detected, because every node can eavesdrop the network traffic of adjacent nodes ([279], ’Watchdog’). Most of the research on reputation and trust models in ad hoc networks focus on that issue.
-
1
In contrast, misbehavior on the application level covers spoof query results and valueless services from nodes that would be able to provide high-quality ones. It is challenging to automatically detect this kind of adverse behavior. Typically it is the end-user who recognizes that a service provided by a certain node does not meet its expectations. But it is very important for open ad hoc networks to detect and expel such nodes. Otherwise, the system can become suspicious, and the users can loose their motivation to participate in the system [317].
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, E. (2007). Trust Mechanisms and Reputation Systems. In: Wagner, D., Wattenhofer, R. (eds) Algorithms for Sensor and Ad Hoc Networks. Lecture Notes in Computer Science, vol 4621. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74991-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-74991-2_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74990-5
Online ISBN: 978-3-540-74991-2
eBook Packages: Computer ScienceComputer Science (R0)