TWOACK: preventing selfishness in mobile ad hoc networks

作者: K. Balakrishnan , Jing Deng , P.K. Varshney

DOI: 10.1109/WCNC.2005.1424848

关键词:

摘要: Mobile ad hoc networks (MANETs) operate on the basic underlying assumption that all participating nodes fully collaborate in self-organizing functions. However, performing network functions consumes energy and other resources. Therefore, some may decide against cooperating with others. Providing these selfish nodes, also termed misbehaving an incentive to cooperate has been active research area recently. In this paper, we propose two network-layer acknowledgment-based schemes, TWOACK S-TWOACK which can be simply added-on any source routing protocol. The scheme detects such then seeks alleviate problem by notifying protocol avoid them future routes. Details of schemes our evaluation results based simulations are presented paper. We have found that, a where up 40% misbehaving, 20% improvement packet delivery ratio, reasonable additional overhead.

参考文章(14)
Levente Buttyán, Jean-Pierre Hubaux, Enforcing service availability in mobile ad-hoc WANs mobile ad hoc networking and computing. pp. 87- 96 ,(2000) , 10.5555/514151.514164
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Yih-Chun Hu, David B. Johnson, Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Ad Hoc Networks. ,vol. 1, pp. 175- 192 ,(2003) , 10.1016/S1570-8705(03)00019-2
J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, M. Vetterli, Toward self-organized mobile ad hoc networks: the terminodes project IEEE Communications Magazine. ,vol. 39, pp. 118- 124 ,(2001) , 10.1109/35.894385
E. Belding-Royer, S. Das, C. Perkins, Ad hoc On-Demand Distance Vector (AODV) Routing IETF-Request-for-Comments, rfc3561.txt. ,vol. 3561, pp. 1- 37 ,(2003)
Yanbin Liu, Y.R. Yang, Reputation propagation and agreement in mobile ad-hoc networks wireless communications and networking conference. ,vol. 3, pp. 1510- 1515 ,(2003) , 10.1109/WCNC.2003.1200610
Sonja Buchegger, Jean-Yves Le Boudec, Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 226- 236 ,(2002) , 10.1145/513800.513828
S. Zhong, J. Chen, Y.R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks international conference on computer communications. ,vol. 3, pp. 1987- 1997 ,(2003) , 10.1109/INFCOM.2003.1209220