We are pleased to invite you to our next Open Seminar organized by AIT on Monday, October the 25th, at 16:30. The Seminar that will take place in amphitheatre 3A (3rd Floor), is entitled “Cooperation Reinforcement in Clustered Mobile Ad-hoc Networks” and will be conducted by Dr. Spyros Vassilaras, Researcher at AIT.
You may register at firstname.lastname@example.org
until Monday noon, October the 25th.
The need for security in wireless networks is of paramount importance for their widespread usage. Apart from classical security issues (such as user, host and packet authentication, data integrity and confidentiality, non-repudiation, key management etc.) ensuring the cooperation of nodes emerges as a crucial and complicated problem in Mobile Ad-hoc networks (MANETs). The correct execution of network functions in MANETs relies on the cooperation of the individual nodes that constitute the network. Malicious nodes that intentionally fail to execute their part of a network protocol in order to cause damage and selfish nodes that do not cooperate in order to save precious resources (such as battery power) can severely disrupt proper network operation. Thus, providing incentive mechanisms that will convince selfish nodes to cooperate and detection mechanisms that will identify malicious nodes and isolate them from the network is a critical issue, which has received considerable attention recently from the research community. In this talk, we present a node reputation scheme aiming at reinforcing node cooperation in Mobile Ad-hoc Networks with centralized control. This scheme was designed for CANA, an Ad-hoc enhancement to HIPERLAN/2, currently under development with the participation of AIT. Misbehavior detection techniques for protocol attacks in both the cluster formation and data transmission phases of the network operation are described. Statistical methods for selecting the optimal parameters of the reputation scheme are investigated and their efficiency is illustrated through theoretical analysis and simulation results. Finally, the specific aspects of CANA that impose particular design decisions are outlined and the applicability of our scheme to other network architectures is discussed.