Enhanced node cooperation technique for outwitting selfish nodes in an ad hoc network

作者: Rekha Kaushik , Jyoti Singhai

DOI: 10.1049/IET-NET.2013.0103

关键词: Computer sciencePacket forwardingWireless ad hoc networkPromiscuous modeNode (computer science)Variable (computer science)Computer networkReputationTopology (electrical circuits)Path (graph theory)

摘要: In an ad hoc network, selfish nodes do not cooperate in packet forwarding of other to maximise their own welfare. Such will have a negative effect on the performance network. this study, enhanced node cooperation technique (ENCT) is proposed which hybrid reputation-based mechanism and incentive-based mechanism. It evaluates relaying nodes’ behaviour, calculates its reputation outwitting by utilising receipts submitted each path centralised authority rather than using promiscuous mode. A mathematical analysis provided demonstrates that expected gain for particular maximum if it adopts cooperative behaviour. To motivate cooperation, variable incentives are proportionate current Simulation results demonstrate modification incentive with varying number nodes, traffic connections, topology static dynamic behaviour nodes. The result shows ENCT robust, fair efficient technique.

参考文章(19)
Mohamed M. E. A. Mahmoud, Xuemin Shen, FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks IEEE Transactions on Mobile Computing. ,vol. 11, pp. 753- 766 ,(2012) , 10.1109/TMC.2011.92
Dimitris E. Charilas, Konstantinos D. Georgilakis, Athanasios D. Panagopoulos, ICARUS: hybrId inCentive mechAnism for coopeRation stimUlation in ad hoc networkS Ad Hoc Networks. ,vol. 10, pp. 976- 989 ,(2012) , 10.1016/J.ADHOC.2011.12.010
Levente Buttyán, Jean-Pierre Hubaux, Enforcing service availability in mobile ad-hoc WANs mobile ad hoc networking and computing. pp. 87- 96 ,(2000) , 10.5555/514151.514164
Mohamed Elsalih Mahmoud, Xuemin Shen, None, PIS: A Practical Incentive System for Multihop Wireless Networks IEEE Transactions on Vehicular Technology. ,vol. 59, pp. 4012- 4025 ,(2010) , 10.1109/TVT.2010.2062549
Qi He, Dapeng Wu, P. Khosla, SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks wireless communications and networking conference. ,vol. 2, pp. 825- 830 ,(2004) , 10.1109/WCNC.2004.1311293
Won Il Lee, Jae Young Pyun, Yang Sun Lee, Sang Woong Lee, Relative velocity based vehicle-to-vehicle routing protocol over ad-hoc networks ubiquitous computing. ,vol. 12, pp. 14- 22 ,(2013) , 10.1504/IJAHUC.2013.051375
Sonja Buchegger, Jean-Yves Le Boudec, Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 226- 236 ,(2002) , 10.1145/513800.513828
Haiying Shen, Ze Li, ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks 2008 The 28th International Conference on Distributed Computing Systems Workshops. pp. 370- 375 ,(2008) , 10.1109/ICDCS.WORKSHOPS.2008.24
S. Zhong, J. Chen, Y.R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks international conference on computer communications. ,vol. 3, pp. 1987- 1997 ,(2003) , 10.1109/INFCOM.2003.1209220