CSR: Constrained Selfish Routing in Ad-Hoc Networks
Routing protocols for ad-hoc networks assume that the nodes forming the network are either under a single authority, or else that they would be altruistically forwarding data for other nodes with no expectation of a return. These assumptions are unrealistic since in ad-hoc networks, nodes are likely to be autonomous and rational (selfish), and thus unwilling to help unless they have an incentive to do so. Providing such incentives is an important aspect that should be considered when designing ad-hoc routing protocols. In this paper, we propose a dynamic, decentralized routing protocol for ad-hoc networks that provides incentives in the form of payments to intermediate nodes used to forward data for others. In our Constrained Selfish Routing (CSR) protocol, game-theoretic approaches are used to calculate payments (incentives) that ensure both the truthfulness of participating nodes and the fairness of the CSR protocol. We show through simulations that CSR is an energy efficient protocol and that it provides lower communication overhead in the best and average cases compared to existing approaches.
KeywordsSource Node Destination Node Intermediate Node Communication Overhead Route Discovery
Unable to display preview. Download preview PDF.
- 1.Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom 2003, pp. 245–259 (2003)Google Scholar
- 2.Buttyan, L., Hubaux, J.: Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report DSC/2001 (2001)Google Scholar
- 5.Zhong, S.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM, pp. 1987–1997 (2003)Google Scholar
- 6.Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: MobiHoc 2002, pp. 226–236 (2002)Google Scholar
- 7.Buchegger, S., Boudec, J.Y.L.: Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In: Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing (2002)Google Scholar
- 8.Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (1999)Google Scholar
- 10.Misra, P.: Routing protocols for ad hoc mobile wireless networks. Technical report, Ohio State University (1999)Google Scholar
- 12.Vickrey, W.: The Journal of Finance (1), 8–37Google Scholar
- 15.Bassem, C., Bestavros, A.: Csr: Constrained selfish routing in ad-hoc networks. Technical report, Computer Science Department, Boston University (2009)Google Scholar