DOI QR코드

DOI QR Code

A Simple but Efficient Scheme for Reliable Connectivity and High Performance in Ad-hoc Wireless Networks

  • Tak, Sung-Woo (School of Computer Science and Engineering, Pusan National University)
  • Received : 2012.04.02
  • Accepted : 2012.05.09
  • Published : 2012.06.30

Abstract

This paper presents a simple but efficient scheme incorporating a reputation-based approach and a cross-layer approach, called the SIM scheme, for maintaining reliable connectivity and high performance in ad-hoc wireless networks. The SIM scheme incorporates the following two things: an ad-hoc routing scheme with a reputation-based approach exploiting the game theory concept based on an evolutionarily stable strategy, and a cross-layer approach between the network layer and the transport layer employing a reputation-based approach.

Keywords

References

  1. D. Johnson, Y. Hu, and D. Maltz, "The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4," The Internet Engineering Task Force, Fremont, CA, RFC 4728, 2007.
  2. C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," The Internet Engineering Task Force, Fremont, CA, RFC 3561, 2003.
  3. S. Buchegger and J. de Boudec, "Performance analysis of the CONFIDANT protocol," Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, pp. 226-236, 2002.
  4. P. Michiardi and R. Mova, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proceedings of the 6th Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, pp. 107-121, 2002.
  5. Q. He, D. Wu, and P. Khosla, "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks," Proceedings of IEEE Wireless Communications and Networking Conference, Atlanta, GA, pp. 825-830, 2004.
  6. F. Almenarez, A. Marin, D. Diaz, and J. Sanchez, "Developing a model for trust management in pervasive devices," Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications Workshop, Pisa, Italy, pp. 1-5, 2006.
  7. A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol. 30, no. 11-12, pp. 2413-2427, 2007. https://doi.org/10.1016/j.comcom.2007.04.022
  8. A. Ukil, "Secure trust management in distributed computing systems," Proceedings of the 6th IEEE International Conference on Electronic Design, Test and Application, Qeenstwon, New Zealand, pp. 116-121, 2011.
  9. P. K. Dutta, Strategies and Games: Theory and Practice, Cambridge, MA: MIT Press, 1999.
  10. M. Seredynski, P. Bouvry, and M. A. Klopotek, "Modelling the evolution of cooperative behavior in ad hoc networks using a game based model," Proceedings of IEEE Symposium on Computational Intelligence and Games, Honolulu, HI, pp. 96-103, 2007.
  11. J. S. Baras and T. Jiang, "Cooperation, trust and games in wireless networks," in Advances in Control, Communication Networks, and Transportation Systems, Boston, MA: Birkhauser, pp. 183-202, 2005.
  12. J. M. Smith and G. R. Price, "The logic of animal conflict," Nature, vol. 246, no. 5427, pp. 15-18, 1973. https://doi.org/10.1038/246015a0
  13. P. D. Straffin, Game Theory and Strategy, Washington, DC: Mathematical Association of America, 1993.
  14. M. Allman, V. Paxson, and W. Stevens, "TCP congestion control," The Internet Engineering Task Force, Fremont, CA, RFC 2581, 2001.
  15. T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications & Mobile Computing, vol. 2, no. 5, pp. 483-502, 2002. https://doi.org/10.1002/wcm.72
  16. S. R. Das, C. E. Perkins, and E. M. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," Proceedings of the 9th Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, pp. 3- 12, 2000.