Buchegger, SonjaLe Boudec, Jean-Yves2004-08-312004-08-312004-08-312002https://infoscience.epfl.ch/handle/20.500.14299/213440In mobile ad-hoc networks, nodes do not rely on any routing infrastructure but relay packets for each other. Thus communication in mobile ad-hoc networks functions properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate, for example to save power or to launch security attacks such as denial-of-service. In this paper, we give an overview of potential vulnerabilities and requirements of mobile ad-hoc networks, and of proposed prevention, detection and reaction mechanisms to thwart attacks.WLNmobile ad-hoc networkssecuritycooperationLCA2-ReputationNCCR-MICSNCCR-MICS/CL2Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishnesstext::conference output::conference proceedings::conference paper