Mobility

Mitigating Routing Vulnerabilities in Ad Hoc Networks Using Reputations

Date Added: Sep 2009
Format: PDF

Nodes in mobile ad hoc networks have limited transmission ranges that necessitate multihop communication. Hence the nodes expect their neighbours to relay the packets meant for nodes out of the transmission range of the source. Ad hoc networks are based on the fundamental assumption that if a node promises to relay a packet, it will relay the packet and will not cheat. This assumption becomes invalid when the nodes in the network have contradictory goals. As a result, routing protocols for ad hoc networks become vulnerable to rogue nodes.