• 제목/요약/키워드: Selfish Routing

검색결과 12건 처리시간 0.024초

IAR-GT: An Incentive Aware Routing based on Game Theory for Selfish Opportunistic Networks

  • Li, Li;Zhong, Xiaoxiong;Jiang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.152-171
    • /
    • 2019
  • In opportunistic networks, nodes may appear some selfishness while transmitting the message, however, most of the existing research works consider the individual selfishness or social selfishness respectively, and these two types of selfishness may coexist in opportunistic networks. In this paper, we propose an Incentive Aware Routing based on Game Theory for selfish OPPNETs, named IAR-GT, which uses Rubinstein-Stahl bargaining game model to incentivize selfish nodes cooperation in data forwarding. IAR-GT scheme not only considers the resources of nodes, but also uses a new method to calculate the social ties between them. Trace-driven simulations show that our incentive aware routing scheme achieves better performances than comparing schemes under two types of selfishness coexistence environments.

A Generous Cooperative Routing Protocol for Vehicle-to-Vehicle Networks

  • Li, Xiaohui;Wang, Junfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5322-5342
    • /
    • 2016
  • In vehicle-to-vehicle (V2V) networks, where selfishness degrades node activity, countermeasures for collaboration enforcement must be provided to enable application of a sage and efficient network environment. Because vehicular networks feature both high mobility and various topologies, selfish behavior judgment and establishment of a stable routing protocol become intensely challenging. In this paper, a two-phase-based generous cooperative routing protocol (called GEC) is presented for V2V networks to provide resistance to selfishness. To detect selfish behaving vehicles, a packet forwarding watchdog and an average connection rate based on the multipath weight method are used, where evidence is gathered from different watchdogs. Then, multihop relay decisions are made using a generous cooperative algorithm based on game theory. Finally, through buffering of the multiple end-to-end paths and judicious choice of optimal cooperative routes, route maintenance phase is capable of dealing with congestion and rapidly exchanging traffic. Specifically, it is proved that the GEC is theoretically subgame perfect. Simulation results show that for V2V networks with inherently selfish nodes, the proposed method isolates uncooperative vehicles and is capable of accommodating both the mobility and congestion circumstances by facilitating information dissemination and reducing end-to-end delay.

이동 애드혹 네트워크에서 라우팅 방식과 무관한 이기적인 노드 관리 방안 (A Routing Independent Selfish Node Management Scheme for Mobile Ad Hoc Networks)

  • 안상현;유영환;이재훈
    • 한국정보과학회논문지:정보통신
    • /
    • 제33권2호
    • /
    • pp.149-155
    • /
    • 2006
  • 현재 이동 애드혹 네트워크(mobile ad hoc network; MANET)의 라우팅 프로토콜들은 모든 노드들이 자발적으로 다른 노드들로부터의 패킷을 포워딩하는데 참석한다고 가정하고 있다. 그러나 하나의 MANET이 여러 관리 기구에 속한 노드들로 구성될 경우, 이동 노드가 자신의 에너지를 절약하기 위해서 다른 노드들로부터의 패킷을 고의적으로 포워딩하지 않을 수도 있으며 이로 인해 네트워크 성능이 저하될 수 있다. 본 논문에서는 노드가 자발적으로 패킷 포워딩에 참여하도록 하는 PIFA(Protocol-Independent Fairness Algorithm)라는 크레딧 지불(credit payment) 기법을 제안한다 DSR과 같은 소스 라우팅 (source routing) 방식에서만 사용할 수 있었던 기존 방법들과는 달리 PIFA는 기반이 되는 라우팅 프로토콜의 종류와 무관하게 사용될 수 있다. 시뮬레이션을 통해, PIFA가 이기적인(selfish) 노드로 하여금 패킷 포워딩에 참여하게 함으로써 네트워크 성능이 저하되지 않게 함을 알았다.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

Optimal Control Of Two-Hop Routing In Dtns With Time-Varying Selfish Behavior

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2202-2217
    • /
    • 2012
  • The transmission opportunities between nodes in Delay Tolerant Network (DTNs) are uncertain, and routing algorithms in DTNs often need nodes serving as relays for others to carry and forward messages. Due to selfishness, nodes may ask the source to pay a certain reward, and the reward may be varying with time. Moreover, the reward that the source obtains from the destination may also be varying with time. For example, the sooner the destination gets the message, the more rewards the source may obtain. The goal of this paper is to explore efficient ways for the source to maximize its total reward in such complex applications when it uses the probabilistic two-hop routing policy. We first propose a theoretical framework, which can be used to evaluate the total reward that the source can obtain. Then based on the model, we prove that the optimal forwarding policy confirms to the threshold form by the Pontryagin's Maximum Principle. Simulations based on both synthetic and real motion traces show the accuracy of our theoretical framework. Furthermore, we demonstrate that the performance of the optimal forwarding policy with threshold form is better through extensive numerical results, which conforms to the result obtained by the Maximum Principle.

다중 홉 무선 네트워크에서 종단 간 신뢰성 통신을 위한 평판 기반의 협력적 라우팅 기법 (A Reputation based Cooperative Routing Scheme for End-to-End Reliable Communications in Multi-hop Wireless Networks)

  • 김태훈;탁성우
    • 한국멀티미디어학회논문지
    • /
    • 제12권11호
    • /
    • pp.1593-1608
    • /
    • 2009
  • 다중 홉 무선 네트워크에서는 일부 중계 단말이 악의적인 목적으로 비협력적이거나 이기적인 행동을 하면 네트워크의 성능이 저하되는 문제점이 발생한다. 무선 단말간의 협력적인 동작을 가정한 기존의 애드혹 라우팅 기법에서는 악의적으로 행동하는 이기적인 무선 단말에 의해 발생되는 성능 감소 문제를 해결할 수 없다. 이에 본 논문에서는 다중 홉 무선 네트워크의 성능을 향상 시킬 수 있는 평판 기반의 협력적 애드혹 라우팅 프로토콜인 CARE (Cooperative Ad hoc routing protocol based REputation) 기법을 제안하였다. 제안한 CARE 기법은 홉 대 홉 기반의 패킷 포워딩 과정에서 악의적으로 행동하거나 무단으로 라우팅 경로에서 이탈하는 이기적인 무선 단말을 우회하도록 라우팅 경로를 설정하는 네트워크 계층간의 수평적 상호 작용을 제공한다. 그리고 CARE 기법은 수직적 상호 작용을 기반으로 하여 MAC 계층으로부터 획득한 무선 채널의 상황 정보를 반영하여 라우팅 경로의 품질 향상시키며, 네트리크 계층에서 획득한 무선 단말의 평판 정보를 전송 계통에 반영하여 TCP의 성능 향상을 제공한다. CARE로 기법의 성능을 평가한 결과, 단말의 빈번한 이동과 악의적인 단말이 존재하는 다중 홉 무선 네트워크 환경에서 패킷 전송의 낮은 실패율과 패킷의 평균 전송 시간의 향상을 제공함과 동시에 종단간 무선 단말의 향상된 TCP 성능을 확인하였다.

  • PDF

A study on Advanced Load-Balanced Ad hoc Routing Protocol

  • Lee, Joo-Yeon;Lee, Cheong-Jae;Kim, Yong-Woo;Song, Joo-Seok
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.1433-1436
    • /
    • 2004
  • The ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure of centralized administration. Load-Balanced Ad hoc Routing(LBAR) protocol is an on-demand routing protocol intended for delay-sensitive applications where users are most concern with packet transmission delay. Although LBAR mechanism is a novel load balancing routing protocol for ad hoc network, it has own limitation in route path maintenance phase. Therefore, in this paper, we propose Advanced Load-Balanced Ad hoc Routing(A-LBAR) that is delay-sensitive and has an efficient path maintenance scheme. The robust path maintenance scheme is maintained by considering about nodal loads all over network and misbehavior of overloaded or selfish nodes. The proposed scheme provides good performance over DSR and AODV in terms of packet delay and packet loss rate when some misbehaving nodes exist in the network.

  • PDF

메커니즘 디자인 접근방식에 기반을 둔 애드혹 네트워크 라우팅 기법 (An Ad-Hoc Network Routing Scheme based on Mechanism Design Approach)

  • 이진형;김승욱
    • 한국정보과학회논문지:정보통신
    • /
    • 제37권3호
    • /
    • pp.198-203
    • /
    • 2010
  • 본 논문에서는 자신의 이익만을 극대화하도록 이기적인 행동을 하는 애드혹 네트워크의 노드들을 관리하는 새로운 라우팅 프로토콜을 제안한다. 제안된 라우팅 기법에서는 무선 노드간의 거리와 남은 에너지를 고려하여 노드 간의 전송 비용을 계산하고 이를 통해 에너지 효율적인 경로를 설정한다. 또한, 해당 경로상의 노드들에게 협조적인 행동을 유도하기 위해 메커니즘 디자인의 일종인 VCG 메커니즘을 이용하여 각 중계 노드에게 인센티브를 제공하고 이를 기반으로 대역폭 예약을 수행해 실시간 데이터에 대한 서비스 품질을 보장하도록 하였다.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

모바일 Ad hoc 네트워크를 위한 신용 평가 보상 프로토콜 (A Reputation Compensation Protocol For Mobile Ad Hoc Networks)

  • 축뢰;강전일;양대헌
    • 정보보호학회논문지
    • /
    • 제16권1호
    • /
    • pp.35-44
    • /
    • 2006
  • 최근 몇 년간, ad hoc 네트워크 영역에 대한 연구자들의 관심이 높아지고 있다. 또한, ad hoc 네트워크에서 동작하는 많은 라우팅 프로토콜이 제안되었다. 이기적 노드란 자신의 전력을 보존하기 위해, 일반 노드가 해야만 하는 특정한 동작의 절차를 따르지 않는 노드를 의미한다. 이 논문에서는 이러한 이기적 노드가 유발하는 유해한 행동을 경감시키는 기법을 제시한다. 또한, 노드의 행동에 영향을 미칠지도 모르는 새로운 환경을 가정한다. 노드들이 네트워크에서 정상적으로 통신하도록 하기 위하여, 이러한 문제를 해결하는 방법에 대해서 제시한다. 또한 이에 따른 모의실험 결과를 논문에 포함하였으며, 이러한 결과를 가지고 우리는 약간의 트래픽을 희생하여 이러한 문제를 해결할 수 있었음을 보였다.