Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Stimulating cooperation in self-organizing mobile ad hoc networks

Published: 01 October 2003 Publication History

Abstract

In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network. In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network. More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes. This problem may arise in civilian applications of mobile ad hoc networks. In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node. We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.

References

[1]
{1} E. Adar and B. Huberman, Free riding on Gnutella, First Monday 5(10) (October 2000).
[2]
{2} R. Anderson and M. Kuhn, Tamper resistance - a cautionary note, in: Proceedings of the Second Usenix Workshop on Electronic Commerce, Oakland, CA (November 1996).
[3]
{3} L. Blazevic´, L. Buttyán, S. Capkun, S. Giordano, J.-P. Hubaux and J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: The approach of terminodes, IEEE Communications Magazine (June 2001).
[4]
{4} L. Blazevic´, S. Giordano and J.-Y. Le Boudec, Self-organizing wide-area routing, in: Proceedings of SCI 2000/ISAS 2000, Orlando (July 2000).
[5]
{5} J. Broch, D. Maltz, D. Johnson, Y.C. Hu and J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Dallas (1998).
[6]
{6} S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes - Fairness In Distributed Ad-hoc NeTworks), in: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland (June 2002).
[7]
{7} L. Buttyán and J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA (August 2000).
[8]
{8} S. Corson, J. Freebersyser and A. Sastry (eds.), Mobile Networks and Applications (MONET), Special Issue on Mobile Ad Hoc Networking (October 1999).
[9]
{9} P. Gupta and P.R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory (March 2000).
[10]
{10} J.-P. Hubaux, L. Buttyán and S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the 2nd IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA (October 2001).
[11]
{11} J.-P. Hubaux, T. Gross, J.-Y. Le Boudec and M. Vetterli, Towards self-organized mobile ad hoc networks: The Terminodes project, IEEE Communications Magazine (January 2001).
[12]
{12} IBM, IBM 4758 PCI Cryptographic Coprocessor, Secure Way Cryptographic Products (June 1997).
[13]
{13} L. Libman and A. Orda, The designer's perspective to atomic noncooperative networks, IEEE/ACM Transactions on Networking 7(6) (1999) 875-884.
[14]
{14} S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Boston, MA (August 2000).
[15]
{15} A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography (CRC Press, Boca Raton, FL, 1997).
[16]
{16} C. Perkins (ed.), Ad Hoc Networking (Addison-Wesley, Reading, MA, 2001).
[17]
{17} A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer (February 1997).
[18]
{18} G.J. Pottie and W.J. Kaiser, Wireless integrated sensor networks, Communications of the ACM (May 2000).
[19]
{19} H. Yaïche, R. Mazumdar and C. Rosenberg, A game theoretic framework for bandwidth allocation and pricing in broadband networks, IEEE/ACM Transactions on Networking 8(5) (2000) 667-678.

Cited By

View all
  • (2022)NB-IoT based Sensor Data Transmission Network OptimizationProceedings of the Asia Conference on Electrical, Power and Computer Engineering10.1145/3529299.3531504(1-5)Online publication date: 22-Apr-2022
  • (2022)Detection and Isolation of Selfish Nodes in MANET Using Collaborative Contact-Based Watchdog with Chimp-AODVWireless Personal Communications: An International Journal10.1007/s11277-022-10004-9128:2(1373-1390)Online publication date: 22-Sep-2022
  • (2021)A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc NetworksSecurity and Communication Networks10.1155/2021/99218262021Online publication date: 1-Jan-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Mobile Networks and Applications
Mobile Networks and Applications  Volume 8, Issue 5
October 2003
126 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 October 2003

Author Tags

  1. cooperation
  2. mobile ad hoc networking
  3. self-organization

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)8
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)NB-IoT based Sensor Data Transmission Network OptimizationProceedings of the Asia Conference on Electrical, Power and Computer Engineering10.1145/3529299.3531504(1-5)Online publication date: 22-Apr-2022
  • (2022)Detection and Isolation of Selfish Nodes in MANET Using Collaborative Contact-Based Watchdog with Chimp-AODVWireless Personal Communications: An International Journal10.1007/s11277-022-10004-9128:2(1373-1390)Online publication date: 22-Sep-2022
  • (2021)A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc NetworksSecurity and Communication Networks10.1155/2021/99218262021Online publication date: 1-Jan-2021
  • (2021)How Users Behave on WPT-motivated MANET: Qualitative Analysis of Users Cooperation2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC49032.2021.9369610(1-4)Online publication date: 9-Jan-2021
  • (2021)cRedit-based and reputation retrieval systemThe Journal of Supercomputing10.1007/s11227-021-03675-x77:9(10184-10225)Online publication date: 1-Sep-2021
  • (2020)TBCS: A Trust Based Clustering Scheme for Secure Communication in Flying Ad-Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07523-8114:4(3173-3196)Online publication date: 1-Oct-2020
  • (2019)Towards a cooperative security system for mobile-health applicationsElectronic Commerce Research10.1007/s10660-018-9296-919:3(629-654)Online publication date: 1-Sep-2019
  • (2018)Acknowledgment-based punishment and stimulation scheme for mobile ad hoc networkThe Journal of Supercomputing10.5555/3288339.328836674:10(5373-5398)Online publication date: 1-Oct-2018
  • (2018)Packet Forwarding Strategies in Multiagent SystemsWireless Communications & Mobile Computing10.1155/2018/49653432018Online publication date: 8-Jul-2018
  • (2018)Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-018-5804-4101:4(2029-2052)Online publication date: 1-Aug-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media