Skip to main content

A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7310))

Abstract

Mobile ad hoc networks (MANETs) are formed by a set of mobile nodes without relying on a preexisting infrastructure. In MANETs, ad hoc nodes should count on intermediate nodes to relay messages between two distant nodes. However, due to the inherent dynamicity of such networks, secure and reliable packet forwarding is difficult to achieve. Besides, considering the scarcity of nodes’ power and computational resources, different nodes might find it economically rational to act selfishly in order to maximize their own welfare during their lifecycle. Therefore, in order to keep the network functional we need a mechanism to enforce nodes’ contribution to network operations despite their internal characteristics and willingness.

In this paper we propose a reputation-based schema to foster cooperation amongst ad hoc nodes in the packet forwarding game and isolate selfish behaviours within the MANETs. In the proposed approach, each node is equipped with a security mechanism to estimate the credibility of its neighbouring nodes as well as adaptive measures to compute the cooperation and defection payoffs in order to strategically choose the most profitable behaviour toward its partners. Experimental results indicate the efficacy of our approach in identifying selfish nodes and promote the adoption of a strategic behaviour determination mechanism in a dynamic network in which different nodes with conflicting tendencies participate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2002, pp. 226–236. ACM, New York (2002)

    Chapter  Google Scholar 

  2. Buttyán, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2000, pp. 87–96. IEEE Press, Piscataway (2000)

    Google Scholar 

  3. Carter, J., Bitting, E., Ghorbani, A.A.: Reputation formalization for an information-sharing multi-agent system. Computational Intelligence 18(4), 515–534 (2002)

    Article  MathSciNet  Google Scholar 

  4. Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: AAMAS (3), pp. 1485–1488 (2008)

    Google Scholar 

  5. He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In: IEEE Wireless Communications and Neworking Conference (WCNC 2004), pp. 825–830 (2004)

    Google Scholar 

  6. Jakobsson, M., Hubaux, J.-P., Buttyán, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 15–33. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom 2000, pp. 255–265. ACM (2000)

    Google Scholar 

  8. Michiardi, P., Molva, R.: CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp. 107–121. Kluwer, B.V. (2002)

    Google Scholar 

  9. Noorian, Z., Marsh, S., Fleming, M.: Multi-layer cognitive filtering by behavioral modeling. In: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011). ACM (2011)

    Google Scholar 

  10. Noorian, Z., Marsh, S., Fleming, M.: Prob-Cog: An Adaptive Filtering Model for Trust Evaluation. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.) Trust Management V. IFIP AICT, vol. 358, pp. 206–222. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Smith, M.J., Desjardins, M.: Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems 18, 36–82 (2009)

    Article  Google Scholar 

  12. Vidal, J.M.: Fundamentals of multiagent systems with NetLogo examples. MIT Press (2001)

    Google Scholar 

  13. Wang, Y., Singh, M.P.: Formal trust model for multiagent systems. In: IJCAI (2007)

    Google Scholar 

  14. Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10), 1755–1772 (2010)

    Article  Google Scholar 

  15. Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM (2003)

    Google Scholar 

  16. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2005, pp. 1–10. ACM, New York (2005)

    Chapter  Google Scholar 

  17. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust cooperative trust establishment for MANETs. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 23–34. ACM (2006)

    Google Scholar 

  18. Zviling, M., Leonov, H., Arkin, I.T.: Genetic algorithm-based optimization of hydrophobicity tables. Bioinformatics 21(11), 2651–2656

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Noorian, Z., Noorian, M., Fleming, M., Marsh, S. (2012). A Strategic Reputation-Based Mechanism for Mobile Ad Hoc Networks. In: Kosseim, L., Inkpen, D. (eds) Advances in Artificial Intelligence. Canadian AI 2012. Lecture Notes in Computer Science(), vol 7310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30353-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30353-1_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30352-4

  • Online ISBN: 978-3-642-30353-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics