Reliable and efficient forwarding in ad hoc networks

被引:10
作者
IIT Institute, CNR, Via G. Moruzzi 1, 56124 Pisa, Italy [1 ]
不详 [2 ]
不详 [3 ]
不详 [4 ]
不详 [5 ]
不详 [6 ]
机构
[1] IIT Institute, CNR, 56124 Pisa
[2] IFIP WGs 6.2
[3] Institute for Informatics and Telematics (IIT), Italian National Research Council (CNR)
来源
Ad Hoc Netw. | 2006年 / 3卷 / 398-415期
关键词
Cooperation; Multipath forwarding; Reliability;
D O I
10.1016/j.adhoc.2004.10.006
中图分类号
学科分类号
摘要
This paper focuses on packet forwarding in ad hoc networks and proposes a new approach to improve performance of nodes communication. In particular, we present a lightweight mechanism for REliable and Efficient Forwarding (REEF), which mitigates the effects of adverse situations caused by cooperation misbehavior or network fault conditions. It exploits nodes' local knowledge to estimates route reliability, and multi-path routing to forward packets on the most reliable route. REEF becomes also a security mechanism in case of a security association established between the communication parties. This additional feature makes the mechanism robust, guaranteeing trustworthiness of the reliability estimator and security of data transmission. A new approach to cooperation enforcing is also proposed. The classical method denies service to misbehaving nodes by, for example, not serving their forwarding requests. We approach the problem less drastically, differentiating the quality of service provided to nodes according to their behavior. In other words, traffic of misbehaving nodes will flow through the network slower than that one of reliable nodes. © 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:398 / 415
页数:17
相关论文
共 17 条
[1]  
Michiardi P., Molva R., Simulation-based analysis of security exposures in mobile ad hoc networks, Proceedings of European Wireless 2002 Conference, (2002)
[2]  
Hu Y., Johnson D.B., Perrig A., Ariadne, a secure on-demand routing protocol for ad hoc networks, Proceedings of MobiCom '02, (2002)
[3]  
Buttyan L., Hubaux J., Stimulating cooperation in self-organizing mobile ad hoc networks, ACMKluwer Mobile Networks and Applications (MONET), 8, 5
[4]  
Zhong S., Chen J., Yang Y., Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, Proceedings of IEEE Infocom '03, (2003)
[5]  
Buchegger S., Boudec J.Y.L., Performance analysis of the CONFIDANT protocol, Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), (2002)
[6]  
Michiardi P., Molva R., CORE, A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proceedings of Communication and Multimedia Security 2002 Conference, (2002)
[7]  
Papadimitratos P., Haas Z., Secure routing for mobile ad hoc networks, Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), (2002)
[8]  
Papadimitratos P., Haas Z.J., Secure message transmission in mobile ad hoc networks, Ad Hoc Networks, 1, pp. 193-209, (2003)
[9]  
Chlamtac I., Conti M., Liu J.J.N., Mobile ad hoc networking: Imperatives and challenges, Ad Hoc Networks, 1, pp. 13-64, (2003)
[10]  
Conti M., Giordano S., Maselli G., Turi G., MobileMAN: Mobile metropolitan ad hoc networks, Proceedings of the 8th International Conference on Personal Wireless Communications (PWC 2003), (2003)