Functional Reputation. The former is the reputation
observed locally by a node with regards to other
nodes. The Indirect Reputation is reputation
provided by nodes to other nodes. Subjective
Reputation and Indirect Reputation are merged by
means of a weighted combining formula in order to
compute a final value of reputation concerning a
specific evaluation criterion (e.g. packet forwarding)
forming Functional Reputation, the last type of
reputation considered. By combining different
functional reputation values concerning different
evaluation criteria, a global reputation value may be
estimated. The subjective reputation is computed by
giving more relevance to past observations than to
recent ones. Subjective Reputation values are
updated on the basis of a Watchdog mechanism, if
misbehaviour is identified. Indirect Reputation
values are updated by means of a reply message that
contains a list of all entries that correctly behaved in
the context of each function. In this study
distribution of positive ratings is allowed so as to
avoid potential denial of service attacks. In case
reputation of an entity is negative, the execution of
any requested operation will be denied by all other
entities in the system. CORE does not provide for a
second-chance mechanism.
2.4 SORI
SORI (Secure and Objective Reputation-based
Incentive) scheme is proposed in (He, 2004) so as to
encourage packet forwarding. SORI consists of three
components, namely, neighbour monitoring (used to
collect information about packet forwarding
behaviour of neighbours), reputation propagation
(employed so as to share information of other nodes
with neighbours) and punishment (involved in the
decision process of dropping packet action, taking
into account the overall evaluation record of a node
and a threshold so as to consider collision events).
Reputation rating formation considers first-hand
information weighted by a confidence value used to
describe how confident a node is for its judgement
on the reputation of another node and second-hand
information weighted by the credibility of nodes
which contribute to the calculation of reputation.
Credibility of a node is defined on the basis of a
node’s behaviour as forwarder and not as a witness.
Reputation rating itself is based on packet
forwarding ratio of a node. SORI does not
discriminate between selfish and misbehaving node
terms. Both terms are used interchangeably
throughout the paper. Additionally, SORI does not
comprise a second-chance / redemption mechanism.
Finally, SORI, in order to tackle with impersonation
threats, constructs an authentication mechanism
based on a one-way-hash chain.
2.5 OCEAN
OCEAN (Observation-based Cooperation
Enforcement in Ad Hoc Networks) approach to
selfishness in ad-hoc networks is to disallow any
second-hand information exchanges (Bansal, 2003).
Instead, a node makes routing decisions based solely
on direct observations of its neighbouring nodes’
interactions with it. OCEAN is designed on top of
DSR protocol, may reside on each node in the
network and hosts five components: Neighbour
Watch (in order to observe the behaviour of the
neighbours of a node), Route Ranker (estimating and
maintaining ratings for each of the neighbouring
nodes), Rank-based Routing (so as to avoid routes
containing nodes in the faulty list), Malicious Traffic
Rejection (rejecting all traffic from nodes it
considers misleading so that a node is not able to
relay its own traffic under the guise of forwarding it
on somebody else’s behalf) and Second Chance
Mechanism (using a time-out based approach for
removing a node from a faulty list after a fixed
period of observed inactivity and assigning to it a
neutral value). Once the rating of a node falls below
a certain threshold, the node is added to the faulty
list comprising all misbehaving nodes. In order to
tackle selfish behaviour, the authors introduce a
simple packet forwarding economy scheme, relying
again only on direct observations of interactions
with neighbours. Due to the usage of only first-hand
information, OCEAN is more resilient to rumour
spreading. Finally, the authors rely on recent work
on proof-of-effort mechanisms and mandate that a
new identity will be accepted only if the owner
shows reasonable effort in generating that identity.
2.6 LARS
In (Hu, 2006), the authors propose LARS (Locally
Aware Reputation System) to mitigate misbehaviour
and enforce cooperation. Each node only keeps the
reputation values of all its one-hop neighbours. The
reputation values are updated on the basis of direct
observations of the node’s neighbours. If the
reputation value of a node drops below an
untrustworthy threshold, then it is considered
misbehaving by the specific evaluator node. In such
a case, the evaluator node will notify its neighbours
about misbehaviour, by initiating a WARNING
message. An uncooperative node is identified in the
WINSYS 2010 - International Conference on Wireless Information Networks and Systems
92