Abstract
Limited onboard battery power is being a major constraint in operation of a mobile ad hoc network. If stricter provisions are not imposed, nodes tend to show selfish behavior in packet forwarding. At the same time, redemption procedure should be proclaimed so that the efficient network services can be ensured. Taking all these aspects in view, we propose a novel reputation establishing and activeness calculation method. Incorporating this method, we propose a mechanism based on game theory and reputation system which not only enforce cooperation but also induce collaboration among nodes. This mechanism is built on strategy which in turn is derived from trust and activity level of nodes. Genetic algorithm is employed for evolution of these strategies. Simulation result shows that this mechanism prevents selfish behavior and induces collaboration among nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Marias, G.F., Georgiadis, P., Flitzanis, D., Mandalas, K.: Cooperation enforcement schemes for MANETs: a survey. Department of Informatics and Telecommunications, University of Athens, 15784, Greece, Department of Informatics, Athens University of Economics and Business, 10434, Greece, (2007)
Marianne, A., El-Kassas AzerSherif Abdel, M., Hassan Wahab, F., El-Soudani Magdy, S.: A survey on trust and reputation schemes in ad hoc networks. IEEE Comput. Soc. Mag. 43(7) (2005)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. Department of Computer Science, Stanford University, USA (2000)
Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Swiss Federal Institute of Technology, Technical report, DSC/2001/001 (2001)
Seredynski, M., Bouvry, P., Klopotek, M.A.: Preventing selfish behavior in ad hoc networks. In: Proceedings of IEEE Congress on Evolutionary Evaluation (2007)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of IFIP 6th Conference on Security Communications, and Multimedia (CMS’02), pp. 107–121 June 2002
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (2002)
Giordano, S., Urpi, A.: A self-organized and cooperative ad hoc networking. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking. Wiley-IEEE Press, New York (2004)
Felegyhazi, M., Hubaux, J.P.: Game theory in wireless networks: a tutorial. Technical report, EPFL, Switzerland (2006)
MacKenzie, A., DaSilva, L. A.: Game theory for wireless engineers. In: Tranter, V.T.W. (ed.) Morgan and Claypool Publishers (2006)
Whitley, D.: A genetic algorithm tutorial. Colorado State University, (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Maurya, G.U.K., Kumar, S. (2014). Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_21
Download citation
DOI: https://doi.org/10.1007/978-81-322-1665-0_21
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1664-3
Online ISBN: 978-81-322-1665-0
eBook Packages: EngineeringEngineering (R0)