CSR: Constrained Selfish Routing in Ad-Hoc Networks

  • Christine Bassem
  • Azer Bestavros
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5682)

Abstract

Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom 2003, pp. 245–259 (2003)Google Scholar
  2. 2.
    Buttyan, L., Hubaux, J.: Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report DSC/2001 (2001)Google Scholar
  3. 3.
    Feigenbaum, J., Papadimitriou, C., Sami, R., Shenker, S.: A bgp-based mechanism for lowest-cost routing. Distrib. Comput. 18(1), 61–72 (2005)CrossRefMATHGoogle Scholar
  4. 4.
    Zhong, S., Li, L.E., Liu, Y.G., Yang, Y.R.: On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretic and cryptographic techniques. Wirel. Netw. 13(6), 799–816 (2007)CrossRefGoogle Scholar
  5. 5.
    Zhong, S.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM, pp. 1987–1997 (2003)Google Scholar
  6. 6.
    Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: MobiHoc 2002, pp. 226–236 (2002)Google Scholar
  7. 7.
    Buchegger, S., Boudec, J.Y.L.: Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In: Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing (2002)Google Scholar
  8. 8.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (1999)Google Scholar
  9. 9.
    Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Mobile Computing, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)CrossRefGoogle Scholar
  10. 10.
    Misra, P.: Routing protocols for ad hoc mobile wireless networks. Technical report, Ohio State University (1999)Google Scholar
  11. 11.
    Hong, X., Xu, K., Gerla, M.: Scalable routing protocols for mobile ad hoc networks. IEEE Network 16(4), 11–21 (2002)CrossRefGoogle Scholar
  12. 12.
    Vickrey, W.: The Journal of Finance (1), 8–37Google Scholar
  13. 13.
    Clarke, E.H.: Multipart pricing of public goods. Public Choice 11(1), 17–33 (1971)CrossRefGoogle Scholar
  14. 14.
    Groves, T.: Incentives in teams. Econometrica 41(4), 617–631 (1973)MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Bassem, C., Bestavros, A.: Csr: Constrained selfish routing in ad-hoc networks. Technical report, Computer Science Department, Boston University (2009)Google Scholar
  16. 16.
    Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications 2, 483–502 (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Christine Bassem
    • 1
  • Azer Bestavros
    • 1
  1. 1.Computer Science DepartmentBoston UniversityBostonUSA

Personalised recommendations