Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1287853.1287865acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks

Published: 09 September 2007 Publication History

Abstract

Mobile ad-hoc networks are deployed under the assumption that participating nodes are willing to forward other nodes' packets. In reputation-based mechanisms cooperation is induced by means of a threat of partial or total disconnection from the network if a node is non-cooperative; however packet collisions and interference may make cooperative nodes appear selfish sometimes. In this paper we use a simple network model to first study the performance of some proposed reputation strategies and then present a new mechanism that we call DARWIN (Distributed and Adaptive Reputation mechanism for WIreless ad-hoc Networks). The idea is to avoid a retaliation situation after a node has been falsely perceived as selfish so cooperation can be restored quickly. We prove that our strategy is robust to imperfect measurements, is collusion-resistant and can achieve full cooperation among nodes.

References

[1]
L. Anderegg and S. Eidenbenz. Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proc. ACM Ninth Annual International Conference on Mobile Computing and Networking (MobiCom '03), pages 245--259, San Diego, CA, Sept. 2003.
[2]
R. Axelrod. The emergence of cooperation among egoists. The American Political Science Review, 75(2):306--318, June 1981.
[3]
S. Bansal and M. Baker. Observation-based cooperation enforcement in ad hoc networks. Technical report, Stanford University, Stanford, CA, July 2003.
[4]
R. Boyd. Mistakes allow evolutionary stability in the repeated prisoner's dilemma game. Journal of Theoretical Biology, 136(1):47--56, Jan. 1989.
[5]
S. Buchegger and J.-Y. Le Boudec. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc '02), pages 226--236, Lausanne, Switzerland, June 2002.
[6]
L. Buttyán and J.-P. Hubaux. Enforcing service availability in mobile ad-hoc WANs. In Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc '00), pages 87--96, Boston, MA, Aug. 2000.
[7]
L. Buttyán and J.-P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications, 8(5):579--592, Oct. 2003.
[8]
J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring. Modelling incentives for collaboration in mobile ad hoc networks. In Proc. WiOpt '03, France, Mar. 2003.
[9]
D. Fudenberg and J. Tirole. Game Theory. The MIT Press, Cambridge, MA, Aug. 1991.
[10]
Q. He, D. Wu, and P. Khosla. SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In Proc. IEEE Wireless Communications and Networking Conference (WCNC '04), volume 2, pages 825--830, Atlanta, GA, Mar. 2004.
[11]
R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan. Sustaining cooperation in multi-hop wireless networks. In Proc. Second Symposium on Networked Systems Design and Implementation (NSDI '05), Boston, MA, May 2005.
[12]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proc. Sixth Annual International Conference on Mobile Computing and Networking (MobiCom '00), pages 255--265, Boston, MA, Aug. 2000.
[13]
P. Michiardi and R. Molva. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. Communications and Multimedia Security Conference (CMS '02), Portoroz, Slovenia, Sept. 2002.
[14]
P. Michiardi and R. Molva. Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks, 3(2):193--219, Mar. 2005.
[15]
F. Milan, J. J. Jaramillo, and R. Srikant. Achieving cooperation in multihop wireless networks of selfish nodes. In Workshop on Game Theory for Networks (GameNets 2006), Pisa, Italy, Oct. 14, 2006.
[16]
J. Mundinger and J.-Y. Le Boudec. The impact of liars on reputation in social networks. In Proc. of Social Network Analysis: Advances and Empirical Applications Forum, Oxford, UK, July 2005.
[17]
M. T. Refaei, V. Srivastava, L. DaSilva, and M. Eltoweissy. A reputation-based mechanism for isolating selfish nodes in ad hoc networks. In Proc. IEEE Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '05), pages 3--11, San Diego, CA, July 2005.
[18]
V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao. Energy efficiency of ad hoc wireless networks with selfish users. In Proc. European Wireless Conference, Florence, Italy, Feb. 2002.
[19]
V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao. Cooperation in wireless ad hoc networks. In Proc. IEEE INFOCOM '03, volume 2, pages 808--817, San Francisco, CA, Mar./Apr. 2003.
[20]
R. Sugden. The Economics of Rights, Cooperation and Welfare. Blackwell Publishing, 1986.
[21]
J. Wu and R. Axelrod. How to cope with noise in the iterated prisoner's dilemma. The Journal of Conflict Resolution, 39(1):183--189, Mar. 1995.
[22]
S. Zhong, J. Chen, and Y. R. Yang. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proc. IEEE INFOCOM '03, volume 3, pages 1987--1997, San Francisco, CA, Mar./Apr. 2003.

Cited By

View all
  • (2022)Game Theory for Cooperation in Multi-Access Edge ComputingResearch Anthology on Edge Computing Protocols, Applications, and Integration10.4018/978-1-6684-5700-9.ch012(229-279)Online publication date: 1-Apr-2022
  • (2022)An online learning algorithm to play discounted repeated games in wireless networksEngineering Applications of Artificial Intelligence10.1016/j.engappai.2021.104520107(104520)Online publication date: Jan-2022
  • (2021)Fuzzy Rough Set Derived Probabilistic Variable Precision-Based Mitigation Technique for Vampire Attack in MANETsWireless Personal Communications10.1007/s11277-021-08673-zOnline publication date: 9-Jul-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking
September 2007
370 pages
ISBN:9781595936813
DOI:10.1145/1287853
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad hoc networks
  2. game theory
  3. reputation mechanisms
  4. wireless networks

Qualifiers

  • Article

Conference

MobiCom/MobiHoc '07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Game Theory for Cooperation in Multi-Access Edge ComputingResearch Anthology on Edge Computing Protocols, Applications, and Integration10.4018/978-1-6684-5700-9.ch012(229-279)Online publication date: 1-Apr-2022
  • (2022)An online learning algorithm to play discounted repeated games in wireless networksEngineering Applications of Artificial Intelligence10.1016/j.engappai.2021.104520107(104520)Online publication date: Jan-2022
  • (2021)Fuzzy Rough Set Derived Probabilistic Variable Precision-Based Mitigation Technique for Vampire Attack in MANETsWireless Personal Communications10.1007/s11277-021-08673-zOnline publication date: 9-Jul-2021
  • (2020)A fair credit-based incentive mechanism for routing in DTN-based sensor network with nodes’ selfishnessEURASIP Journal on Wireless Communications and Networking10.1186/s13638-020-01823-02020:1Online publication date: 9-Nov-2020
  • (2020)Balancing Energy Consumption and Reputation Gain of UAV Scheduling in Edge ComputingIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2020.30045926:4(1204-1217)Online publication date: Dec-2020
  • (2020)Community Behavior UnderstandingHuman Behavior Analysis: Sensing and Understanding10.1007/978-981-15-2109-6_7(219-260)Online publication date: 1-Mar-2020
  • (2020)A Multi-factor Reputation Evaluation Model of Vehicular NetworkEmerging Trends in Intelligent and Interactive Systems and Applications10.1007/978-3-030-63784-2_94(763-770)Online publication date: 18-Dec-2020
  • (2019)Game Theory for Cooperation in Multi-Access Edge ComputingPaving the Way for 5G Through the Convergence of Wireless Systems10.4018/978-1-5225-7570-2.ch005(100-149)Online publication date: 2019
  • (2019)Orchestrating Heterogeneous Communities using Middleware Approach2019 International Conference on Information Science and Communication Technology (ICISCT)10.1109/CISCT.2019.8777427(1-10)Online publication date: Mar-2019
  • (2019)Visualizing and Aggregating Behavior for Trust Evaluation2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)10.1109/CAMAD.2019.8858434(1-6)Online publication date: Sep-2019
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media