Advertisement

Mobile Networks and Applications

, Volume 8, Issue 5, pp 579–592 | Cite as

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks

  • Levente Buttyán
  • Jean-Pierre Hubaux
Article

Abstract

In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network. In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network. More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes. This problem may arise in civilian applications of mobile ad hoc networks. In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node. We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.

mobile ad hoc networking self-organization cooperation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    E. Adar and B. Huberman, Free riding on Gnutella, First Monday 5(10) (October 2000).Google Scholar
  2. [2]
    R. Anderson and M. Kuhn, Tamper resistance û a cautionary note, in: tiProceedings of the Second Usenix Workshop on Electronic Commerce, Oakland, CA (November 1996).Google Scholar
  3. [3]
    L. Blažević, L. Buttyán, S. Čapkun, S. Giordano, J.-P. Hubaux and J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: The approach of terminodes, IEEE Communications Magazine (June 2001).Google Scholar
  4. [4]
    L. Blažević, S. Giordano and J.-Y. Le Boudec, Self-organizing widearea routing, in: tiProceedings of SCI 2000/ISAS 2000, Orlando (July 2000).Google Scholar
  5. [5]
    J. Broch, D. Maltz, D. Johnson, Y.C. Hu and J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: tiProceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Dallas (1998).Google Scholar
  6. [6]
    S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes û Fairness In Distributed Adhoc NeTworks), in: tiProceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland (June 2002).Google Scholar
  7. [7]
    L. Buttyán and J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: tiProceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA (August 2000).Google Scholar
  8. [8]
    S. Corson, J. Freebersyser and A. Sastry (eds.), Mobile Networks and Applications (MONET), Special Issue on Mobile Ad Hoc Networking (October 1999).Google Scholar
  9. [9]
    P. Gupta and P.R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory (March 2000).Google Scholar
  10. [10]
    J.-P. Hubaux, L. Buttyán and S. Čapkun, The quest for security in mobile ad hoc networks, in: tiProceedings of the 2nd IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA (October 2001).Google Scholar
  11. [11]
    J.-P. Hubaux, T. Gross, J.-Y. Le Boudec and M. Vetterli, Towards selforganized mobile ad hoc networks: The Terminodes project, IEEE Communications Magazine (January 2001).Google Scholar
  12. [12]
    IBM, IBM 4758 PCI Cryptographic Coprocessor, Secure Way Cryptographic Products (June 1997).Google Scholar
  13. [13]
    L. Libman and A. Orda, The designer's perspective to atomic noncooperative networks, IEEE/ACM Transactions on Networking 7(6) (1999) 875–884.Google Scholar
  14. [14]
    S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: tiProceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom), Boston, MA (August 2000).Google Scholar
  15. [15]
    A. Menezes, P. van Oorschot and S. Vanstone, tiHandbook of Applied Cryptography (CRC Press, Boca Raton, FL, 1997).Google Scholar
  16. [16]
    C. Perkins (ed.), tiAd Hoc Networking (Addison-Wesley, Reading, MA, 2001).Google Scholar
  17. [17]
    A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer (February 1997).Google Scholar
  18. [18]
    G.J. Pottie and W.J. Kaiser, Wireless integrated sensor networks, Communications of the ACM (May 2000).Google Scholar
  19. [19]
    H. Yaïche, R. Mazumdar and C. Rosenberg, A game theoretic framework for bandwidth allocation and pricing in broadband networks, IEEE/ACM Transactions on Networking 8(5) (2000) 667–678.Google Scholar

Copyright information

© Kluwer Academic Publishers 2003

Authors and Affiliations

  • Levente Buttyán
    • 1
  • Jean-Pierre Hubaux
    • 1
  1. 1.Laboratory for Computer Communications and Applications, Swiss Federal Institute of Technology – Lausanne, EPFL-IC-LCALausanneSwitzerland

Personalised recommendations